Matt Nelson Profile
Matt Nelson

@enigma0x3

Followers
33K
Following
4K
Media
121
Statuses
5K

@specterops | Enjoys abusing features | https://t.co/aN1kcQxRJt

Indianapolis, IN
Joined January 2011
Don't wanna be here? Send us removal request.
@SpecterOps
SpecterOps
2 days
How do you model hybrid attack paths that span GitHub, GCP, Azure, and AD? @c0kernel has released SecretHound, a new BloodHound OpenGraph extension for secrets 🤫 — enabling modeling of “credential watering holes” across tech platforms.
Tweet card summary image
specterops.io
Presents a framework using technology subgraphs, decomposition, and graph abstraction to model hybrid attack paths in BloodHound OpenGraph.
0
11
32
@atomiczsec
Gavin K
18 days
introducing Adrenaline, a toolkit of many BOFs to speed up recon or prepare for large scale orchestration/eventing the idea is to introduce a bunch of small BOFs that are designed to output small but actionable information to later use for analysis or targeting more info below
1
1
8
@SpecterOps
SpecterOps
25 days
Don't miss this one. 👀 @zyn3rgy & @Tw1sm are sharing techniques to better inform your NTLM relays and discussing RelayInformer, an open-source project that identifies EPA enforcement across the majority of popular NTLM relay targets. Save your spot 👉 https://t.co/qfcl7Lvw9q
0
10
43
@SpecterOps
SpecterOps
27 days
SCCM is one of the most relied-on enterprise tools, but that legacy comes with risk. Join @unsigned_sh0rt this Friday at #BSidesPDX as he discusses how attackers can abuse #SCCM Entra integrations to gain admin access. ➡️ https://t.co/7UiihoC0kA
0
12
44
@SpecterOps
SpecterOps
24 days
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
310
653
@jaredcatkinson
Jared Atkinson
27 days
In this post @_wald0 introduces PingOneHound, a BloodHound OpenGraph extension that allows users to visualize, audit, and remediate attack paths in their PingOne environment. The blog post also serves as an introduction to the PingOne architecture. https://t.co/BjD5DPiih1
Tweet card summary image
specterops.io
You can use PingOneHound in conjunction with BloodHound Community Edition to discover, analyze, execute, and remediate identity-based attack paths in PingOne instances.
0
26
50
@_logangoins
Logan Goins
27 days
I feel like @YuG0rd's briefly mentioned new dMSA account takeover mechanism in his last blog didn't get enough attention. A new account takeover mechanism is on the horizon. I wrote a blog detailing it, releasing with a new BOF I wrote called BadTakeover https://t.co/fyUkDYKAeP
Tweet card summary image
specterops.io
After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning to the community that attackers can still...
3
44
107
@jaredcatkinson
Jared Atkinson
1 month
Ever notice how every identity system depends on something else — and those dependencies are often invisible? That’s the idea behind the Clean Source Principle and why it matters for the future of identity security. https://t.co/Ov1eN8Jsjs
Tweet card summary image
specterops.io
TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no matter how strong any single platform appears. The Clean Source Principle and BloodHound...
1
6
19
@SpecterOps
SpecterOps
2 months
Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code.
Tweet card summary image
specterops.io
DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs
1
116
284
@enigma0x3
Matt Nelson
2 months
Absolutely terrifying. Amazing find!
@_dirkjan
Dirk-jan
2 months
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
1
1
12
@_logangoins
Logan Goins
3 months
I Just documented a cool way to authenticate proxied tooling to LDAP in an AD environment using C2 payload auth context, without stealing any tickets or hashes! Keep tooling execution off-host and away from EDR on your Red Team assessments! https://t.co/VLE2Kh4idY
Tweet card summary image
specterops.io
TL;DR When operating out of a ceded access or phishing payload with no credential material, you can use low-privilege HTTP authentication from the current user context to perform a proxied relay to...
5
119
417
@SpecterOps
SpecterOps
3 months
Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service remotely as a low-privileged user. @0xthirteen breaks down the service startup mechanics, plus the protocols and technologies.
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
59
174
@SpecterOps
SpecterOps
3 months
Manual recon commands eating up your time? 🕐 @atomiczsec breaks down how Mythic Eventing automates those repetitive reconnaissance tasks during RTOs, complete with starter YAML scripts you can customize.
Tweet card summary image
specterops.io
Mythic Eventing automates repetitive tasks during red team operations (RTO). Gavin Kramer documents this eventing system and provides a collection of starter YAML scripts for the community.
0
22
80
@atomiczsec
Gavin K
3 months
During my internship at @SpecterOps, I had the amazing opportunity to support red team and penetration test engagements. This lead to the creation of my capstone project, which I presented at the Seattle office and created a SpecterOps blog which you can see more about here:
@SpecterOps
SpecterOps
3 months
Manual recon commands eating up your time? 🕐 @atomiczsec breaks down how Mythic Eventing automates those repetitive reconnaissance tasks during RTOs, complete with starter YAML scripts you can customize.
1
3
29
@SpecterOps
SpecterOps
3 months
MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without touching the SharpHound & BloodHound codebases. @_Mayyhem unpacks this new feature in his blog post. 👇
Tweet card summary image
specterops.io
TL;DR MSSQLHound is a standalone PowerShell collector that adds 7 new nodes and 37 new MSSQL attack path edges to BloodHound using the new OpenGraph feature that was released in version 8.0. This...
1
53
132
@SpecterOps
SpecterOps
4 months
Your devs aren’t just writing code, they’re holding keys to your kingdom. 🔑 BloodHound now supports GitHub identities, so you can visualize access & control in your org’s dev pipeline. Read more about this & other features in BloodHound 8.0: https://t.co/TOcfzrrtqS
1
9
43
@SpecterOps
SpecterOps
4 months
Data is gold and Snowflake is full of it. BloodHound now understands Snowflake’s access model. Map who can reach your critical data, and how they’d do it. Learn more about what is available w/ BloodHound 8.0: https://t.co/TOcfzrrtqS
0
11
51
@_wald0
Andy Robbins
4 months
In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound:
Tweet card summary image
specterops.io
TL;DR OpenGraph makes it easy to add new nodes and edges into BloodHound, but doesn’t design your data model for you. This blog post has everything you need to get started with proper attack graph...
1
42
96
@SpecterOps
SpecterOps
4 months
Red teamers know the drill: endless file churning, hunting for passwords & tokens. 🔍 Meet DeepPass2, our new secret scanning tool that goes beyond structured tokens to catch those tricky free-form passwords too. Read Neeraj Gupta's blog post for more.
Tweet card summary image
specterops.io
Discover DeepPass2 - a secret scanning tool combining BERT-based model and LLMs to detect free-form passwords, and other structured tokens and secrets with high accuracy.
3
46
154
@SpecterOps
SpecterOps
4 months
Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and conditional access bypass. @hotnops explores cross-domain compromise tradecraft within the same tenant. Read more ⤵️
Tweet card summary image
specterops.io
How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains
2
59
119