Azure App Services For Offensive OperationsIn this blog, I will be covering how to use Azure App Services for offensive purposes.May 14, 2020May 14, 2020
Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS and ADIntroductionSep 26, 2019Sep 26, 2019
Getting Started With AzureDevOpsA getting-started guid to building C# tools with Azure DevOps.Sep 18, 2019Sep 18, 2019
IntroductionSteve Borosh is a Principal Security Consultant for Trustwave and Trustwave Government Solutions, specializing in offensive security…Jun 24, 2019Jun 24, 2019
Published inPosts By SpecterOps Team MembersPhishing tales: Microsoft Access Macro (.MAM) shortcutsPreviously, I blogged about the ability to create malicious .ACCDE Microsoft Access Database files and using them as a phishing vector…Jul 3, 20181Jul 3, 20181
Published inPosts By SpecterOps Team MembersShelling Apache Felix With Java BundlesAdministrative portals remain one of the top “low hanging fruit” categories to be on the lookout for when performing bug bounties…Jun 20, 2018Jun 20, 2018