SpecterOps Resources

Back to Top
Rethinking Federal Procurement in the Age of Cloud and AI
ARTICLE
Federal agencies face challenges in acquiring modern cloud and AI technologies due to outdated procurement rules, rigid funding,...

READ MORE
Attack Path Management: Maturity Model
ARTICLE
This article introduces Identity Attack Path Management (Identity APM) as a new security practice to address how attackers explo...

READ MORE
State of Attack Path Management: Identity Risk Through a New Lens
ARTICLE
This article introduces Attack Path Management (APM) as a new security practice to address the risk of identity-based attacks th...

READ MORE
BloodHound Enterprise Government Data Sheet
ARTICLE
The SpecterOps BloodHound Enterprise government solutions brief emphasizes the importance of managing identity attack paths to e...

READ MORE
Subverting Sysmon
CASE STUDY
Assessing the effectiveness of endpoint and network security products is imperative to identifying and addressing the threats it...

READ MORE
Subverting Trust in Windows
WHITEPAPER
The trust architecture of security products is a critical component in measuring their efficacy. Download and read this SpecterO...

READ MORE
Let’s Get Better. Together.
SOLUTIONS BRIEF
SpecterOps believes that training is an essential part of integrating a new security tool or capability into your network. Check...

READ MORE
We Help Build Best In-Class Security Operations
SOLUTIONS BRIEF
By adopting the mindset of a network adversary aimed at operating against an organization’s enterprise environment, Specte...

READ MORE
A Voyage to Uncovering Telemetry
REPORT
Remote procedure call (RPC) is used within networks for everyday functions that involve communication between programs. In this ...

READ MORE
Certified Pre-Owned: Abusing Active Directory Certificate Services
REPORT
Though widely adopted, Active Directory Certificate Services (AD CS) is often misunderstood and has the potential to result in d...

READ MORE
Purple Team Assessments: Understand Efficacy of Detection Capabilities
SOLUTIONS BRIEF
Understanding how a network adversary might work to dismantle an organization’s enterprise environment is a critical compo...

READ MORE
An Ace Up the Sleeve: Designing Active Directory DACL Backdoors
REPORT
Active Directory (AD) security descriptors hold secret pathways often unnoticed by both attackers and defenders. This SpecterOps...

READ MORE
A Process is No One: Hunting for Token Manipulation
REPORT
When hunting for malicious behaviors in a network environment, it is important to ensure that already in-place defensive solutio...

READ MORE