SpecterOps Resources

Back to Top
BloodHound Enterprise Government Data Sheet
ARTICLE
The SpecterOps BloodHound Enterprise government solutions brief emphasizes the importance of managing identity attack paths to e...

READ MORE
Subverting Sysmon
CASE STUDY
Assessing the effectiveness of endpoint and network security products is imperative to identifying and addressing the threats it...

READ MORE
Subverting Trust in Windows
WHITEPAPER
The trust architecture of security products is a critical component in measuring their efficacy. Download and read this SpecterO...

READ MORE
Let’s Get Better. Together.
SOLUTIONS BRIEF
SpecterOps believes that training is an essential part of integrating a new security tool or capability into your network. Check...

READ MORE
We Help Build Best In-Class Security Operations
SOLUTIONS BRIEF
By adopting the mindset of a network adversary aimed at operating against an organization’s enterprise environment, Specte...

READ MORE
A Voyage to Uncovering Telemetry
REPORT
Remote procedure call (RPC) is used within networks for everyday functions that involve communication between programs. In this ...

READ MORE
Certified Pre-Owned: Abusing Active Directory Certificate Services
REPORT
Though widely adopted, Active Directory Certificate Services (AD CS) is often misunderstood and has the potential to result in d...

READ MORE
Purple Team Assessments: Understand Efficacy of Detection Capabilities
SOLUTIONS BRIEF
Understanding how a network adversary might work to dismantle an organization’s enterprise environment is a critical compo...

READ MORE
An Ace Up the Sleeve: Designing Active Directory DACL Backdoors
REPORT
Active Directory (AD) security descriptors hold secret pathways often unnoticed by both attackers and defenders. This SpecterOps...

READ MORE
A Process is No One: Hunting for Token Manipulation
REPORT
When hunting for malicious behaviors in a network environment, it is important to ensure that already in-place defensive solutio...

READ MORE