unsigned_sh0rt Profile Banner
Garrett Profile
Garrett

@unsigned_sh0rt

Followers
2K
Following
3K
Media
138
Statuses
1K

Research at @SpecterOps

Portland, OR
Joined August 2009
Don't wanna be here? Send us removal request.
@unsigned_sh0rt
Garrett
6 months
Non-infosec post this time. I try to stray away from talking about my personal life here as much as I can especially when it comes to my family. In November 2023 my son Oliver was diagnosed with level 3 Autism Spectrum Disorder.
3
7
38
@unsigned_sh0rt
Garrett
3 days
knew win10 had the dsquery.dll laying around but never knew what to do with it. "rundll32.exe dsquery.dll OpenQueryWindow" will pop open a console for you and you can do some light LDAP recon. you can also open with with win + ctrl + f. probably useful for VDI/Citrix type tests
Tweet media one
6
76
371
@unsigned_sh0rt
Garrett
10 days
Wanted to say thank you to everyone who shared/donated! My wife hit her goal and I couldn't be more grateful!.
@unsigned_sh0rt
Garrett
6 months
She's started a fundraiser in his honor to help give back to the community that has supported him so much. I want to support her every way I can. Please consider sharing and/ or donating for autism research!
4
2
18
@unsigned_sh0rt
Garrett
16 days
RT @BurningRiverCon: Calling all hackers from Cleveland and beyond!. Burning River Cyber Con will be held on November 15, 2025. We are lo….
0
2
0
@unsigned_sh0rt
Garrett
16 days
RT @_dirkjan: @NathanMcNulty Intune be like
Tweet media one
0
7
0
@unsigned_sh0rt
Garrett
17 days
I automated the POC for stealing policies from MP relays from this blog into a modified version of mssqlclient would work too with any other piv account to the DB. (no PR because impacket doesnt merge, sorry).
Tweet card summary image
github.com
modified mssqlclient from impacket to extract policies from the SCCM database - garrettfoster13/mssqlkaren
4
42
115
@unsigned_sh0rt
Garrett
19 days
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
57
0
@unsigned_sh0rt
Garrett
19 days
@nyxgeek did you do this
Tweet media one
2
2
5
@unsigned_sh0rt
Garrett
24 days
RT @SpecterOps: The DSInternals PowerShell module just got an upgrade! 🔥. Updates include:.✅ Golden dMSA Attack.✅ Full LAPS support.✅ Trust….
Tweet card summary image
specterops.io
Discover the latest enhancements to the DSInternals PowerShell module, including the Golden dMSA Attack and support for LAPS, trust passwords, or BitLocker recovery keys.
0
40
0
@unsigned_sh0rt
Garrett
26 days
Who doesn't like free creds?.
@SpecterOps
SpecterOps
26 days
PDQ SmartDeploy versions prior to 3.0.2046 used static, hardcoded encryption keys for cred storage. Low-privileged users could potentially access admin creds from registry or deployment files. @unsigned_sh0rt unpacks his testing in his latest blog post.
3
11
37
@unsigned_sh0rt
Garrett
27 days
My wife just showed me Taylor Swift’s website…buckle up
Tweet media one
0
0
12
@unsigned_sh0rt
Garrett
27 days
RT @SpecterOps: The AD CS security landscape keeps evolving, and so does our tooling. 🛠️. @bytewreck drops info on Certify 2.0, including a….
Tweet card summary image
specterops.io
Certify 2.0 features a suite of new capabilities and usability enhancements. This blogpost introduces changes and features additions.
0
98
0
@unsigned_sh0rt
Garrett
29 days
RT @RonB_Y: Speaking at @defcon was as fun as always! My new tool called RPC-Racer is now available. It masquerades as a legitimate RPC ser….
Tweet card summary image
github.com
Toolset to manipulate RPC clients by finding delayed services and masquerading as them - SafeBreach-Labs/RPC-Racer
0
45
0
@unsigned_sh0rt
Garrett
1 month
WSFC misconfigurations can turn your domain into one big fustercluck. I'm sharing fustercluck today as part of my #BHUSA presentation. The README summarizes the issues and a detailed blog is coming soon.
Tweet card summary image
github.com
POC tool to abuse windows server failover clusters - garrettfoster13/fustercluck
4
51
115
@unsigned_sh0rt
Garrett
1 month
My presentation starts in 20 minutes! Oceanside C level 2. Hope to see you there! #BHUSA
Tweet media one
0
2
17
@unsigned_sh0rt
Garrett
1 month
I pushed updates to SCCMHunter as part of my Arsenal demo at #BHUSA today! New features include a relay module for TAKEOVER-5 and a community contribution to coerce client push from a *nix host for ELEVATE-2.
Tweet card summary image
github.com
[1.1.10] - 2025-08-06 Added Relay Module Added a new module to support TAKEOVER-5. Operators can relay coerced authentication to the SMS Provider role to compromise SCCM. HTTP Module Thanks ...
1
48
134