
Will Schroeder
@harmj0y
Followers
47K
Following
1K
Media
150
Statuses
6K
Researcher @SpecterOps. Coding towards chaotic good while living on the decision boundary.
Joined August 2012
Active Directory forests are no longer a security boundary thanks to @tifkin_'s printer bug. Check out for weaponization and mitigation details and @Cyb3rWard0g's post for detection guidance
19
787
1K
If you're interested in Kerberos or Active Directory and haven't read @elad_shamir's "Wagging the Dog" post, do yourself a favor and dive in. You won't regret it.
5
244
542
"Operational Guidance for Offensive User DPAPI Abuse" documenting some of the ways to use Mimikatz to play with DPAPI. Thanks @gentilkiwi for all the awesome features! :).
4
338
496
The offensive security community means a lot to me. Following @Antonlovesdnb's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.
4
206
480
Finally the end of a very fun ride- I've merged Dev to Master for PowerSploit and marked the project as no longer supported. Offensive PowerShell was how I started my career, and I owe @obscuresec and @mattifestation a debt of gratitude for bringing me in. [1/3].
9
93
452
Hey, I heard you like creds! You might like this adaptation of some of @gentilkiwi's DPAPI Mimikatz work: ("Troopers Edition"). Unfamiliar with DPAPI? Check out . Also, @gentilkiwi was right:
1
176
352
Thanks for everyone for coming to @tifkin_, @enigma0x3, and my @DerbyCon talk "The Unintended Risks of Trusting Active Directory"! The slides are up at and the printer bug code is live at
5
158
334
[blog/tool] "From Kekeo to Rubeus" - my journey in reimplementing various aspects of @gentilkiwi's #kekeo project. Code is live at !.
6
222
299
Good news everyone! Rubeus 2.0 is coming _very_ soon, with massive improvements and new features from @exploitph and @_EthicalChaos_ . They've worked hard to bring us all some new fun :)
4
71
292
The code that @tifkin_ , @enigma0x3, and I built for our ‘The Unintended Risks of Trusting Active Directory’ talk is now up at !.
5
140
288
Just released SharpDPAPI v 1.6.0. Landed @lefterispan's PR to incorporate /password:X for masterkey decryption, and integrated the new Chrome v80+ AES key stuff from @djhohnstein's SharpChrome project. Chrome triage is back on the table!
2
125
290
Rubeus 1.6.0 is out! I had pretty much nothing to do with the new functionality- all @exploitph and @_EthicalChaos_'s awesome work. Writeup on changes at . More detail on @exploitph's #opsec changes is at
1
108
267
This is an amazing thread for anyone interested in AD and/or kerberos!.
[thread 🧵] Kerberos basics & (ab)use of Certificates within Active Directory (i.e. AD CS and PKINIT). - Kerberos 101.- Pass-the-Certificate.- UnPAC-the-Hash.- Shadow Credentials.- AD CS escalation (ESC1 to ESC8). (Links and credits at the end)
2
78
254
Here's first post on my journey into security-focused machine learning, "Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation" Huge shoutout to @danielhbohannon and @Lee_Holmes on blazing the way on this problem set!.
10
101
246
"Another Word on Delegation" - abusing resource-based constrained delegation to take over computer objects. Thanks to @elad_shamir for the idea and Rubeus addition!.
1
166
237
The detailed breakdown of the remote reg DACL modification work from @tifkin_, @enigma0x3, and myself - "Remote Hash Extraction On Demand Via Host Security Descriptor Modification"
3
159
231
Thank you @WEareTROOPERS for another amazing experience! The slides for @tifkin_'s and my "Not a Security Boundary: Breaking Forest Trusts" talk are up at demo video at blog at
0
118
227
the updated slides for @_wald0's and my @BlackHatEvents/@defcon presentation "An ACE Up the Sleeve" are now up at
2
141
215
Thanks for the warm welcome @Sp4rkCon ! The slides for @tifkin_ , @enigma0x3, and my presentation "The Unintended Risks of Trusting Active Directory" are now up at
2
118
208
I usually don't share a lot of personal details on Twitter- this past fall my mom died from a rare brain disease and the @ASPCA was one of her favorite causes. Andy/the BH team let me choose them for the charity drive in her honor. Thank you to all who grab a shirt <3.
The #BloodHoundEnterprise team presents: #BloodHound 4.1!. Highlights for this release in this thread 🧵:. With this release, we are selling this limited edition BloodHound shirt. All profits from the sales of this shirt will be donated to the @ASPCA:
21
25
202
"A Case Study in Wagging the Dog: Computer Takeover" - another example of @elad_shamir's recent resource-based constrained delegation work!.
1
101
188
I finally landed @exploitph's new `nopac` Rubeus goodness landed in master! Check out his writeup at if you haven't already 👍.
0
59
173
The slides from my @BlueHatIL talk "The Travelling Pentester: Diaries of the Shortest Path to Compromise" are up at
2
132
169
The demo videos from @tifkin_ , @enigma0x3 , and my #DerbyCon2018 talk "The Unintended Risks of Trusting Active Directory" are up at and , and the video recording is at
0
85
154
One more new feature for Rubeus 1.2.0 - MS kpasswd resets a la ArotoPW … Post on all the new fun at … Thanks again for #kekeo @gentilkiwi! <3.
0
92
145
In case you missed it, @exploitph and @4ndr3w6S just released some _awesome_ work that just landed into Rubeus' master branch- "Diamond Tickets"! Check out more details at Great work Charlie and Andrew!!.
3
62
136
The slides for @tifkin_'s and my #BlackHatEurope 2021 talk "ReCertifying Active Directory" about securing Active Directory Certificate Services are up at . Thanks to everyone who attended!.
1
78
131
@Antonlovesdnb @elad_shamir To continue, @_xpn_'s entire blog. The breadth and depth of Adam's work is truly amazing, but if I had to pick a favorite recent post(s) it would be his articles on Mimikatz internals: and
2
31
130
Finally got des_cbc_md5 and aes128_cts_hmac_sha1 support fully integrated into Rubeus so @gentilkiwi would stop being disappointed in me :) Also have some recent Kerberoasting modifications I'll be blogging about soon!.
1
44
127