jaredcatkinson Profile Banner
Jared Atkinson Profile
Jared Atkinson

@jaredcatkinson

Followers
10K
Following
8K
Media
283
Statuses
7K

| CTO @specterops | Host @dcpthepodcast | Ex PowerShell MVP | USAF Vet | FC Bayern Supporter | Language Learner 🇳🇴 🇮🇹 🇧🇷 |

Las Vegas, NV
Joined July 2013
Don't wanna be here? Send us removal request.
@jaredcatkinson
Jared Atkinson
2 years
💡 WHAT IS PURPLE TEAMING AT SPECTEROPS? SpecterOps recently introduced our Purple Team service offering, but what is it? We define it as "the evaluation of security control efficacy through atomic testing using deliberately selected test cases." https://t.co/SSwnzSxUGK
specterops.io
SpecterOps announced new Purple Team Assessment Services, a two-week assessment that evaluates how well an organization’s security controls can detect and prevent common attack techniques...
1
31
90
@SpecterOps
SpecterOps
11 days
Your strongest platform is only as secure as its weakest dependency. And you probably don't know what those are. @jaredcatkinson dives into the Clean Source Principle, hidden trust relationships, & why BloodHound OpenGraph changes the game.
Tweet card summary image
specterops.io
TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no matter how strong any single platform appears. The Clean Source Principle and BloodHound...
0
12
44
@jaredcatkinson
Jared Atkinson
12 days
Ever notice how every identity system depends on something else — and those dependencies are often invisible? That’s the idea behind the Clean Source Principle and why it matters for the future of identity security. https://t.co/Ov1eN8Jsjs
Tweet card summary image
specterops.io
TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no matter how strong any single platform appears. The Clean Source Principle and BloodHound...
1
6
19
@SpecterOps
SpecterOps
18 days
What happens when the User-Account-Restrictions property gets misconfigured? Spoiler: It's not good. From account compromise to full domain takeover, @unsigned_sh0rt breaks down why this permission set is more dangerous than most realize.
Tweet card summary image
specterops.io
TL;DR - The User-Account-Restrictions property grants read/write permissions to the user-account-control LDAP attribute, which can be used to manipulate account and security settings. Delegating...
0
54
92
@clintgibler
Clint Gibler
19 days
🐕 𝐈𝐀𝐌𝐡𝐨𝐮𝐧𝐝𝐝𝐨𝐠 A tool to identify privileged principals and second-order privilege escalation in AWS environments. Compatible with BloodHound. By mapping relationships between IAM entities and resources.
1
8
27
@nft_paris
NFT Paris
7 days
NFT Paris is back on February 5-6 at La Grande Halle de La Villette. 🎟 Last chance to get the best deal of the edition: 2 tickets for the price of 1. Offer valid until October 22.
0
3
19
@jaredcatkinson
Jared Atkinson
26 days
Better late than never. I wrote a post that analyzes the Salesloft-Drift breach in the context of Attack Paths. https://t.co/seQmEBHti1 My main takeaways: 1) Hybrid paths are not limited to two platforms owned by the same organization 2) Ad-hoc paths arise when passwords are
Tweet card summary image
specterops.io
This post analyzes the Salesloft–Drift incident through an attack path lens, showing how violations of the clean source principle, identities in transit, and hidden hybrid paths combined to turn a...
2
23
91
@jaredcatkinson
Jared Atkinson
26 days
Better late than never. I wrote a post that analyzes the Salesloft-Drift breach in the context of Attack Paths. https://t.co/seQmEBHti1 My main takeaways: 1) Hybrid paths are not limited to two platforms owned by the same organization 2) Ad-hoc paths arise when passwords are
Tweet card summary image
specterops.io
This post analyzes the Salesloft–Drift incident through an attack path lens, showing how violations of the clean source principle, identities in transit, and hidden hybrid paths combined to turn a...
2
23
91
@SpecterOps
SpecterOps
27 days
🎙️ NEW PODCAST: #KnowYourAdversary @jaredcatkinson & @JustinKohler10 explore identity security from the attacker's perspective. Real stories, real tactics, real insights. Check out our first three episodes now 👉 https://t.co/gmfNAiRuRD
0
6
18
@Print3M_
Print3M
1 month
"The Renaissance of NTLM Relay Attacks: Everything You Need to Know" by @elad_shamir (@SpecterOps) 🔥 One of the best overview of NTLM relay technique I've ever seen. (and the styling is is an art in itself!) #redteam #security #infosec #windows https://t.co/eRK7yg7B8U
4
98
354
@SpecterOps
SpecterOps
2 months
BloodHound isn't just for Active Directory anymore. 🤯 @SadProcessor dives into the BloodHound OpenGraph functionality & demonstrates the new PowerShell cmdlets added to the BloodHound Operator module to work with the OpenGraph feature.
Tweet card summary image
specterops.io
A Technical Dive Into BloodHound OpenGraph With BloodHound Operator & Master Yoda… TL;DR: The latest version of BloodHound introduces BloodHound OpenGraph. This new feature allows for ingestion of...
1
23
79
@SpecterOps
SpecterOps
2 months
Cookie theft has evolved. 🍪 Over the last year, stealing cookies on Windows devices has changed significantly for Chromium browsers like Chrome and Edge. Andrew Gomez dives into these changes, how threat actors adapt, & new detection opportunities.
Tweet card summary image
specterops.io
Explore how cookie theft has evolved in Chromium browsers with the shift from DPAPI to App-Bound encryption. This post breaks down modern cookie stealing techniques via COM, remote debugging, and...
3
76
154
@clintgibler
Clint Gibler
2 months
🛠️ Two JAMF Security Tools 𝐉𝐚𝐦𝐟𝐇𝐨𝐮𝐧𝐝 - Ingest JAMF attack paths into BloodHound 𝐄𝐯𝐞 - A JAMF exploitation toolkit 1️⃣ JamfHound by @SpecterOps A Python tool that collects and identifies attack paths in Jamf Pro tenants by analyzing object permissions and outputting
1
38
128
@SpecterOps
SpecterOps
2 months
Trying to fly under EDR's radar? @_logangoins explains how to use HTTP-to-LDAP relay attacks to execute tooling completely off-host through the C2 payload context. Perfect for when you need LDAP access but want to avoid being caught stealing creds.
Tweet card summary image
specterops.io
TL;DR When operating out of a ceded access or phishing payload with no credential material, you can use low-privilege HTTP authentication from the current user context to perform a proxied relay to...
1
75
227
@SpecterOps
SpecterOps
2 months
New blog post just dropped! West Shepherd breaks down extending the Mythic Poseidon agent for ARM64 Dylib injection on Apple Silicon. Details include: ✅ Shellcode construction ✅ Memory allocation ✅ Runtime patching ✅ Thread creation Read more ⤵️
Tweet card summary image
specterops.io
This post details how the Mythic Poseidon agent was extended to support ARM64 Dylib injection on Apple Silicon
5
46
121
@helpnetsecurity
Help Net Security
2 months
1
11
26
@SpecterOps
SpecterOps
2 months
Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service remotely as a low-privileged user. @0xthirteen breaks down the service startup mechanics, plus the protocols and technologies.
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
59
173
@SpecterOps
SpecterOps
2 months
You can now map attack paths throughout your entire tech stack with BloodHound OpenGraph. @JustinKohler10, @jaredcatkinson, @_wald0 & @StephenHinck chatted about this & other new features in BloodHound v8.0 during our recent webinar. 👀 Watch on demand: https://t.co/1JNp4vwTHL
0
3
15
@SpecterOps
SpecterOps
2 months
BloodHound OpenGraph allows you to map attack paths across ANY platform. @jaredcatkinson spoke with @DarkReading during #BHUSA about how you can now connect the dots between Active Directory, GitHub repositories, and other sensitive assets. 👀: https://t.co/8FuEtfZd9a
1
6
22
@SpecterOps
SpecterOps
2 months
The DSInternals PowerShell module just got an upgrade! 🔥 Updates include: ✅ Golden dMSA Attack ✅ Full LAPS support ✅ Trust password & BitLocker recovery key extraction ✅ Read-only domain controller database compatibility Read more from @MGrafnetter.
Tweet card summary image
specterops.io
Discover the latest enhancements to the DSInternals PowerShell module, including the Golden dMSA Attack and support for LAPS, trust passwords, or BitLocker recovery keys.
0
40
109
@SpecterOps
SpecterOps
2 months
We are breaking down our State of Attack Path Management report. Join @jaredcatkinson, @AndrewChiles, & @elad_shamir as they discuss some key takeaways from the report to help you understand & address attack paths before they're exploited. Register 👉 https://t.co/ptlsSugHlZ
0
6
13