Logan Goins (@_logangoins) 's Twitter Profile
Logan Goins

@_logangoins

Offensive Security Consultant Co-op, IBM X-Force Red

ID: 1781163077980860416

linkhttps://logan-goins.com calendar_today19-04-2024 03:29:10

29 Tweet

886 Followers

110 Following

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.

LuemmelSec (@theluemmel) 's Twitter Profile Photo

Extended on Logan Goins work for BadProcessor Fully native PowerShell Domain joined or not doesn't matter Check DCs Check ACLs Nice gridview Create weaponized dmsa The tool now helps in detectin / mitigation and attacking github.com/LuemmelSec/Pen…

Extended on <a href="/_logangoins/">Logan Goins</a> work for BadProcessor
Fully native PowerShell
Domain joined or not doesn't matter
Check DCs
Check ACLs
Nice gridview
Create weaponized dmsa

The tool now helps in detectin / mitigation and attacking
github.com/LuemmelSec/Pen…
SpecterOps (@specterops) 's Twitter Profile Photo

BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest. Check out Jim Sykora's latest blog post to understand how you can mitigate risk. ghst.ly/4kXTLd9

SpecterOps (@specterops) 's Twitter Profile Photo

Ready to level up your offensive security career? 📈 Join our Consulting Services team as a Senior Offensive Security Consultant doing what you love: red teaming, penetration testing, capability assessments, and research. Learn more & apply today: ghst.ly/3PBmGFZ

Ready to level up your offensive security career? 📈

Join our Consulting Services team as a Senior Offensive Security Consultant doing what you love: red teaming, penetration testing, capability assessments, and research. 

Learn more &amp; apply today: ghst.ly/3PBmGFZ
SpecterOps (@specterops) 's Twitter Profile Photo

Recently, Microsoft changed the way the Entra Connect Sync agent authenticates to Entra ID. Check out our latest blog post from Daniel Heinsen to learn how the agent works now & how these changes affect attacker tradecraft. ghst.ly/3ZpMc6y

RedTeam Pentesting (@redteampt) 's Twitter Profile Photo

🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live: 🪞 The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos: blog.redteam-pentesting.de/2025/reflectiv…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

Will Schroeder (@harmj0y) 's Twitter Profile Photo

Thank you so much to /ˈziːf-kɒn/ and its organizers for an awesome experience! Lee Chagolla-Christensen and I had a blast talking about the new Nemesis 2.0 rewrite (code live at github.com/SpecterOps/Nem… !) and hope to be back next year #x33fcon

SpecterOps (@specterops) 's Twitter Profile Photo

Introducing the BloodHound Query Library! 📚 Martin Sohn & Joey Dreijer explore the new collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem. ghst.ly/4jTgRQQ

Jonas Bülow Knudsen (@jonas_b_k) 's Twitter Profile Photo

I publish two blog posts today! 📝🐫  The first dives into how we're improving the way BloodHound models attack paths through AD trusts: specterops.io/blog/2025/06/2…  The second covers an attack technique I came across while exploring AD trust abuse: specterops.io/blog/2025/06/2…

SpecterOps (@specterops) 's Twitter Profile Photo

Are you at #TROOPERS25? Don't miss Duane Michael & Garrett's follow-up to their talk last year, providing an update on what’s new in SCCM security and what remains dangerously overlooked. ghst.ly/3FEAHS1

Are you at #TROOPERS25? Don't miss <a href="/subat0mik/">Duane Michael</a> &amp; <a href="/unsigned_sh0rt/">Garrett</a>'s follow-up to their talk last year, providing an update on what’s new in SCCM security and what remains dangerously overlooked. ghst.ly/3FEAHS1
S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a loggedon user session 🔥 github.com/rtecCyberSec/B… No need to steal credentials, no impersonation, no injection needed 👌

SpecterOps (@specterops) 's Twitter Profile Photo

So you've compromised a host that isn’t cloud-joined. Antero Guy breaks down how to request OAuth tokens & enumerate an Entra ID tenant by using an SSO cookie from a non cloud-joined device. Read more ⬇️ ghst.ly/445tQKL

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Last week we added ELEVATE-4 github.com/subat0mik/Misc… to Misconfiguration Manager. tl;dr If SCCM uses AD CS for PKI, client auth certs are "borrowed" by clients during OSD. This will typically be a distribution point but could be the site server in all-in-one deployments...

Yeeb (@yeeb_) 's Twitter Profile Photo

Created small tool that joins a device to a Tailscale network and exposes a local SOCKS proxy. It’s built for red team pivots and quick access into (restricted) environments. The underlying tsnet library is currently Go-only, so it's semi-portable for now. github.com/Yeeb1/SockTail

Dave Cossa (@g0ldengunsec) 's Twitter Profile Photo

Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence. ibm.com/think/x-force/…