jaredcatkinson Profile Banner
Jared Atkinson Profile
Jared Atkinson

@jaredcatkinson

Followers
10K
Following
8K
Media
283
Statuses
7K

| CTO @specterops | Host @dcpthepodcast | Ex PowerShell MVP | USAF Vet | FC Bayern Supporter | Language Learner 🇳🇴 🇮🇹 🇧🇷 |

Las Vegas, NV
Joined July 2013
Don't wanna be here? Send us removal request.
@jaredcatkinson
Jared Atkinson
2 years
💡 WHAT IS PURPLE TEAMING AT SPECTEROPS? SpecterOps recently introduced our Purple Team service offering, but what is it? We define it as "the evaluation of security control efficacy through atomic testing using deliberately selected test cases." https://t.co/SSwnzSxUGK
specterops.io
SpecterOps announced new Purple Team Assessment Services, a two-week assessment that evaluates how well an organization’s security controls can detect and prevent common attack techniques...
2
31
91
@SpecterOps
SpecterOps
4 days
We’re excited to announce Kevin Mandia as the keynote speaker for #SOCON2026! 🎉 His keynote will focus on how the threat landscape has evolved in the face of modern adversary tradecraft. Secure your spot ➡️ https://t.co/DnlUAv9tRY
0
3
14
@SpecterOps
SpecterOps
5 days
2️⃣ Next, @Breakfix dives into the SCOM agent. This post uncovers how RunAs creds reach endpoints, how they’re recovered off-host, and how rogue enrollment exposes sensitive data. Plus: introducing SharpSCOM for automated RunAs recovery. https://t.co/1KS5VVcxWc 🧵: 2/2
Tweet card summary image
specterops.io
We found that SCOM RunAs credentials could be obtained on-host and also off-host in certain configurations and wrote a tool to help automate their recovery. To skip straight to the tool, go here...
0
16
33
@SpecterOps
SpecterOps
5 days
Wanting more from today's #BHEU talk on SCOM? Check out this two part blog series! 1️⃣ @unsigned_sh0rt maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. https://t.co/Ai4TqTtc4O 🧵: 1/2
Tweet card summary image
specterops.io
TL:DR; SCOM suffers from similar insecure default configurations as its SCCM counterpart, enabling attackers to escalate privileges, harvest credentials, and ultimately compromise the entire manage...
1
48
116
@GucciZarini
Alexandra Gucci Zarini
10 days
INTRODUCING THE UNITY BAG Designed by Alexandra Gucci Zarini in honor and support of FOSTERING THE FUTURE.   The Unity Bag carries a quiet message of hope and shared vision: that we must come together �� in unity for our children — to protect and uplift them toward a brighter
304
462
3K
@SpecterOps
SpecterOps
11 days
Attackers can bypass identity controls and pivot from on-prem to cloud with ease. Join @JustinKohler10 & @jaredcatkinson at #GartnerIAM as they break down recent breaches and how Identity Attack Path Management helps teams eliminate exploitable paths. https://t.co/FrqCKBnrcB
0
2
9
@SpecterOps
SpecterOps
19 days
Network shares are an overlooked attack surface. Misconfigs & permissive rights can enable lateral movement, data theft, & escalation. Join @podalirius_ for a ShareHound demo → discover shares, export to OpenGraph, & run Cypher analysis. Register 👉 https://t.co/uOuKC1N3Dx
0
7
46
@SpecterOps
SpecterOps
20 days
How does PingOne’s architecture shape real attacker movement? In our new #KnowYourAdversary, @_wald0 & @pingidentity’s Bjorn Aannestad discuss RBAC, environment design, & cross-platform risks. https://t.co/K8WsxzQLx0 Visit booth #736 at #GartnerIAM to learn about PingOneHound.
0
1
5
@olafhartong
Olaf Hartong
25 days
#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. We're releasing a management tool and rule repository in YAML format to share new rules with the community. https://t.co/kxit8fFjhU
5
45
172
@SpecterOps
SpecterOps
26 days
Identity is the new battleground. @jaredcatkinson talks with @thecyberwire about how attackers chain misconfigurations and identity relationships to reach critical assets, and how Attack Path Management stops them. 🎧: https://t.co/3yGAg4ZSqx
0
2
11
@SpecterOps
SpecterOps
26 days
SCCM’s AdminService uses Entra tokens without confirming the UPN exists in AD. A crafted synced UPN can let an attacker impersonate the site server. Microsoft now requires on-prem SID matching (CVE-2025-59501). Great deep dive by @unsigned_sh0rt! https://t.co/FGAHfaXHsY
0
67
173
@SpecterOps
SpecterOps
27 days
Modern attack surfaces are chaos. Let’s make sense of them. Join the runZero Hour TOMORROW as @jaredcatkinson joins @runZeroInc's @todb, Rob King, & @hdmoore in exploring how graph-based analysis transforms defense. https://t.co/PiUrdwonIV
0
2
4
@SpecterOps
SpecterOps
1 month
Run, don’t walk! 🏃‍♂️ The #SOCON2026 CFP closes tomorrow! Share your research, your stories, your “aha” moments — before the clock runs out. 📝: https://t.co/0YvPbfVtXc
0
1
4
@SpecterOps
SpecterOps
1 month
How do you model hybrid attack paths that span GitHub, GCP, Azure, and AD? @c0kernel has released SecretHound, a new BloodHound OpenGraph extension for secrets 🤫 — enabling modeling of “credential watering holes” across tech platforms.
Tweet card summary image
specterops.io
Presents a framework using technology subgraphs, decomposition, and graph abstraction to model hybrid attack paths in BloodHound OpenGraph.
0
14
38
@runZeroInc
runZero, Inc.
1 month
runZero Hour is one week away! Join us on Nov 19: @todb, Rob King, @hdmoore, and @jaredcatkinson (@SpecterOps) break down attacker movement, graph analysis, runZeroHound, and this month’s top vulnerabilities. 👉 Register: https://t.co/5mb8jagJA3
0
1
3
@0xr0BIT
r0BIT
1 month
This is (probably) the last time I‘ll nag you with TaskHound. Since my org doesn’t allow me to use memes in our official blogs I finally took the hint and stopped procrastinating. My personal Blog is now live :). https://t.co/Sp2aj2Y0EO (Disclaimer: may contain sarcasm and memes)
2
20
84
@SpecterOps
SpecterOps
1 month
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ https://t.co/Vo9XksEfmn
Tweet card summary image
specterops.io
AdminSDHolder is an object and associated process in Active Directory Domain Services (AD DS) that helps protect specific sensitive and highly privileged accounts from being manipulated. This topic...
2
51
211
@SpecterOps
SpecterOps
2 months
See your network shares the way attackers do. 👀 Meet ShareHound, an OpenGraph collector for BloodHound CE & Enterprise that reveals share-level attack paths at scale. @podalirius_ unpacks all the details in our latest blog post.
Tweet card summary image
specterops.io
ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.
0
47
187
@jaredcatkinson
Jared Atkinson
2 months
This is a really exciting extension of the BloodHound attack graph. I view this as a way to increase the resolution with which organizations can see/assess their exposure to ransomware attacks. In a ransomware incident, the point of initial access is relatively random. With
@podalirius_
Rémi GASCOU (Podalirius)
2 months
I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 https://t.co/2e2DBIndcU
1
2
20