How to Emulate a Ransomware Attack

Overview Ransomware is here to stay and cyber security professionals need to be trained to prevent, detect, respond, and recover from ransomeware attacks. So, how do we do that in an ethical and repeatable way? This post will walk through how SpecterInsight’s ransomware emulation capability works and give insight into the inner workings of a […]

How to Emulate a Ransomware Attack Read More »

How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation

Overview The primary tactic we will be exploring in this post is the use of proxies inside of a target network. There are a lot of different types of proxies for both offense and defense. This post will focus on Internal Proxies (MITRE 1090.001) which are a sub-technique of Proxy (MITRE 1090). We will cover

How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation Read More »

Credential Harvesting with PowerShell and SpecterInsight

Overview Credential harvesting, also known as credential theft or credential stealing, refers to the collection sensitive authentication information from individuals or systems. The goal of credential harvesting is to obtain usernames, passwords, or other authentication tokens that allow access to protected resources. This post will cover a variety of different credential harvesting techniques, how to

Credential Harvesting with PowerShell and SpecterInsight Read More »

Persistence with WMI Event Subscription and PowerShell Cradles

Overview In this post, we are going to demonstrate how to build a script to automate persistence lay down via WMI Event Subscription and dynamically generated PowerShell payloads. By the end, we will have a single parameterized script that can be leveraged to establish signature resistant persistence, thus alleviating much of the tedious manual work

Persistence with WMI Event Subscription and PowerShell Cradles Read More »

Scroll to Top