Lee Chagolla-Christensen's Avatar

Lee Chagolla-Christensen

@tifkin

I like making computers misbehave. Does stuff at http://specterops.io. Github: https://github.com/leechristensen Mastodon: @tifkin_@infosec.exchange

282
Followers
68
Following
6
Posts
05.10.2023
Joined
Posts Following

Latest posts by Lee Chagolla-Christensen @tifkin

Preview
An Evening with Claude (Code) - SpecterOps This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.

AI tooling and MCP servers are entering enterprises fast, often faster than security teams can assess the risks.

During a recent engagement, @xpnsec.com found a new Claude Code vuln (CVE-2025-64755) while exploring MCP abuse paths.

πŸ‘€ Read the details: ghst.ly/49ybl4W

21.11.2025 16:33 πŸ‘ 10 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0
Preview
Catching Credential Guard Off Guard - SpecterOps Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.

Credential Guard was supposed to end credential dumping. It didn't.

Valdemar CarΓΈe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.

Read for more: ghst.ly/4qtl2rm

23.10.2025 17:45 πŸ‘ 17 πŸ” 10 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - SpecterOps/Nemesis: An offensive data enrichment pipeline An offensive data enrichment pipeline. Contribute to SpecterOps/Nemesis development by creating an account on GitHub.

Happy Friday! @tifkin.bsky.social and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG for a (brief) summary of changes, and dive into our new docs for more detail! We're extremely proud and excited for this release github.com/SpecterOps/N...

28.06.2025 04:14 πŸ‘ 12 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0
Post image

So, here's a little thread on my new open source project:

The Tradecraft Garden.

tradecraftgarden.org

It's Crystal Palace, an open-source linker and linker script specialized to writing PIC DLL loaders.

And, a corpora of DLL loaders demonstrating design patterns building tradecraft with it.

05.06.2025 14:36 πŸ‘ 24 πŸ” 13 πŸ’¬ 1 πŸ“Œ 2

Post-ex Weaponization: An Oral History

aff-wg.org/2025/04/10/p...

A walk-through of some history on post-ex eco-systems used by CS (PowerShell, Reflective DLLs, .NET, and BOFs).

Ends with a coffee conversation talking about magician's guilds, security research, and ideas about what's next.

10.04.2025 14:24 πŸ‘ 12 πŸ” 7 πŸ’¬ 0 πŸ“Œ 2

I attended last week's Pall Mall Process conference in Paris.

I wanted to dump a few notes, writing from my perspective as a security researcher, hacker, former entrepreneur, and creator of a well-known C2 platform (one that, importantly, I'm no longer involved with).

07.04.2025 22:21 πŸ‘ 4 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Post image

BIG NEWS: SpecterOps raises $75M Series B to strengthen identity security! Led by Insight Partners with Ansa Capital, M12, Ballistic Ventures, Decibel, and Cisco Investments. ghst.ly/seriesb

#IdentitySecurity #CyberSecurity

(1/6)

05.03.2025 17:33 πŸ‘ 16 πŸ” 9 πŸ’¬ 1 πŸ“Œ 1

Not sexy things, but they make my day-to-day usage much better. I've seen many people bemoan about Ghidra 's interface. My experience with ANY tool is that things don't change unless the problem is reported to the devs. So reach out and lay out your concerns - they'll respond!

07.02.2025 21:00 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Ghidra 11.3 is out! There's some awesome new features, but I want to highlight how responsive the dev team is to questions, issues, and feature suggestions. They've addressed several issues I've opened, notably a bunch of quality of life UI/UX things I've had while using Ghidra.

07.02.2025 21:00 πŸ‘ 8 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
Top 10 web hacking techniques of 2024 Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! portswigger.net/research/top...

04.02.2025 15:02 πŸ‘ 66 πŸ” 36 πŸ’¬ 2 πŸ“Œ 5

@tiraniddo.dev Did you by chance check if the MUP redirector supports port specification in UNC paths?

31.01.2025 18:18 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
SlackPirate Set Sails Again! Or: How to Send the Entire β€œBee Movie” Script to Your Friends in Slack TLDR: SlackPirate has been defunct for a few years due to a breaking change in how the Slack client interacts with the Slack API. It has a…

SlackPirate sets sail again! πŸ΄β€β˜ οΈ

In his latest blog post, Dan Mayer intros his new PR to SlackPirate that lets you loot Slack again out of the box, a BOF to get you all the data you need to do it, & how to bee the most active slacker in your group chat. 🐝 ghst.ly/4hgwMIt

31.01.2025 16:27 πŸ‘ 5 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Windows Bug Class: Accessing Trapped COM Objects with IDispatch Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...

New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...

30.01.2025 18:37 πŸ‘ 65 πŸ” 41 πŸ’¬ 2 πŸ“Œ 0
Preview
Misconfiguration Manager: Detection Updates TL;DR: The Misconfiguration Manager DETECT section has been updated with relevant guidance to help defensive operators identify the most…

The Misconfiguration Manager DETECT section has been updated with fresh guidance to help defensive operators spot the most prolific attack techniques.

Check out the blog post from @bouj33boy.bsky.social to learn more. ghst.ly/3VJ5y4F

16.12.2024 16:08 πŸ‘ 6 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0
Preview
Attacking Entra Metaverse: Part 1 This is part one in a two (maybe three…) part series regarding attacker tradecraft around the syncing mechanics between Active Directory…

A new fun way to set shadow credentials
posts.specterops.io/attacking-en...

13.12.2024 16:48 πŸ‘ 9 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0

Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph πŸ˜ƒ

12.12.2024 16:00 πŸ‘ 44 πŸ” 19 πŸ’¬ 3 πŸ“Œ 1
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

25.11.2024 17:31 πŸ‘ 62 πŸ” 42 πŸ’¬ 3 πŸ“Œ 0
Defining the Undefined: What is Tier Zero, Part 4
On Demand

Defining the Undefined: What is Tier Zero, Part 4 On Demand

If you missed Part 4 in our What is Tier Zero webinar series hosted by Jonas BΓΌlow Knudsen, @martinsohn.dk & @tifkin.bsky.social last week, you can watch the full presentation on demand now!

πŸ‘€: ghst.ly/4eSssxL

19.11.2024 21:51 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Rashomon of disclosure In a world of changing technology, there are few constants - but if there is one constant in security, it is the rhythmic flare-up of discu...

Tech companies could break backwards compat, move off legacy tech stacks, or move to secure defaults but choose not at the risk of affecting profits. Instead they move the risk to their downstream software consumers(businesses) who pay for it it breaches.

See addxorrol.blogspot.com/2019/08/rash...

15.11.2024 20:22 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

On a similar vein of your original post, a hill I'll die on:

The majority of beaches are due to tech providers lack of prioritizing security, and not due to an average company's IT "not securing" their network.

15.11.2024 20:18 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

So long and thanks for the CVEs!

12.11.2024 22:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Tomorrow, 10am, BinaryFormatter dies.

12.11.2024 04:19 πŸ‘ 93 πŸ” 25 πŸ’¬ 16 πŸ“Œ 6
Exploiting KsecDD through Server Silos – SCRT Team Blog

πŸ†• New blog post! "Exploiting KsecDD through Server Silos"

In my latest mini research project, I've been working with my teammate @PMa1n (X) on extending the work of @floesen_ (X) on the KsecDD driver. I'm thrilled to finally share the results.

πŸ‘‰ blog.scrt.ch/2024/11/11/e...

11.11.2024 13:40 πŸ‘ 12 πŸ” 7 πŸ’¬ 1 πŸ“Œ 0