- Grow Your Own SCCM Lab!The offensive usage of SCCM has become a big topic in recent months and years. In this article, I will cover the basics of SCCM and how to configure an SCCM lab from scratch. I also have another article which shows the currently known attack vectors involving SCCM. As with every article on SCCM, lets … Read more
- Offensive SCCM SummaryThis article aims to summarise the currently available tooling (August 2023), as well as the attack vectors which are present. My previous article covers the basics of SCCM and how to configure an SCCM lab from scratch. In summary, I believe the SCCM attack surface is currently not especially well understood or covered by most, … Read more
- BloodHound & Cypher LanguageA look at the more complex features of BloodHound’s Cypher query language, with several examples of how it can be used to audit an environment.
- BloodHound BasicsA quick primer on the basics of BloodHound, the well-known Active Directory auditing tool
- Digging Into Mimikatz’s lsadump And sekurlsaMimikatz is a tool which has always surprised me with how many functions and features it has. In this post I dig into the lsadump and sekurlsa functions to see what all of the modules do.