Chris Thompson

494 posts

Chris Thompson banner
Chris Thompson

Chris Thompson

@_Mayyhem

Senior Security Researcher @SpecterOps https://t.co/Sz5fRYkX6u

Katılım Ağustos 2015
483 Takip Edilen2.7K Takipçiler
Sabitlenmiş Tweet
Chris Thompson
Chris Thompson@_Mayyhem·
My SCCM BloodHound OpenGraph collector, ConfigManBearPig, is finally ready to share! It can enumerate all of the relay TAKEOVERs and a few CRED and ELEVATE techniques from Misconfiguration Manager with just a domain account. Let me know what you find! specterops.io/blog/2026/01/1…
English
5
77
180
13.8K
Chris Thompson retweetledi
Lukas Klein | @rantasec.bsky.social
Check out GoLinHound: - Discovers Linux & SSH attack paths - Outputs OpenGraph JSON for BloodHound ingestion - Integrates with SharpHound and AzureHound data to unveil cross-technology attack paths github.com/RantaSec/golin…
English
2
33
75
4K
Chris Thompson retweetledi
SpecterOps
SpecterOps@SpecterOps·
Every Entra ID assessment ends here: “How do I get a token without triggering Conditional Access controls?” 🤔 @rbnroot built CAPSlock, an offline ROADrecon-based Conditional Access engine that simulates sign-ins & flags gaps without touching the tenant. ghst.ly/4aKIk64
English
3
89
279
28.4K
Chris Thompson retweetledi
SpecterOps
SpecterOps@SpecterOps·
Introducing BloodHound Scentry: BloodHound Enterprise + SpecterOps experts working alongside your team to eliminate attack paths and accelerate APM. Level 0 → Level 3 maturity in ~6 months. Not theory. Tradecraft. 🎯 Learn more ➡️ ghst.ly/bhscentry-tw
SpecterOps tweet media
English
1
12
27
2.6K
Chris Thompson retweetledi
Jonny Johnson
Jonny Johnson@JonnyJohnson_·
@_subTee reminded me that the Projected File System existed on Windows recently, so I decided to do a deep dive. Turns out - this is probably the best base technology for canary/deception features out there. There is also a splash of offensive use cases😎 @HuntressLabs Blog: huntress.com/blog/windows-p…
English
1
39
114
10.9K
Chris Thompson retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
I can't believe Microsoft killed one of my favorite labs in my Entra ID training 😭. The Azure CLI and Azure PowerShell are no longer FOCI clients. On a serious note: good for security!
English
6
28
117
15.1K
Chris Thompson
Chris Thompson@_Mayyhem·
@jannisj If it's breaking due to the new NTLM rejection, there should be a way to force the use of Kerberos by supplying a fully qualified domain name. Looks like there's an issue tracking this that might help: github.com/MSEndpointMgr/…
English
1
0
1
94
Jannis Jacobsen
Jannis Jacobsen@jannisj·
@_Mayyhem And after you upgrade to 2509, modern driver management breaks :/
English
1
0
0
106
Chris Thompson
Chris Thompson@_Mayyhem·
RIP SCCM hierarchy TAKEOVER-5: #adminservice-now-rejects-ntlm-authentication" target="_blank" rel="nofollow noopener">learn.microsoft.com/en-us/intune/c… github.com/subat0mik/Misc… It's a good idea to upgrade to 2509 ASAP, sysadmin friends! There's no other mitigation if you have an SMS Provider hosted remotely from the site server AFAIK.
English
12
41
103
12.6K
Chris Thompson retweetledi
Garrett
Garrett@unsigned_sh0rt·
I found unauthenticated bugs in MDT that can be abuse to coerce authenticaton from the host server or to leak creds stored in the deployment share's rules file. Instead of fixing the issues, Microsoft retired MDT. specterops.io/blog/2026/01/2…
English
2
56
126
17.6K
Chris Thompson retweetledi
SpecterOps
SpecterOps@SpecterOps·
Don't miss this one. 👀 @zyn3rgy & @Tw1sm are sharing techniques to better inform your NTLM relays and discussing RelayInformer, an open-source project that identifies EPA enforcement across the majority of popular NTLM relay targets. Save your spot 👉 ghst.ly/web-oct-tw
SpecterOps tweet media
English
0
17
52
4.9K
Chris Thompson
Chris Thompson@_Mayyhem·
Also a good detection opportunity based on that line in AdminService.log @Praga_Prag
English
0
1
4
962
SpecterOps
SpecterOps@SpecterOps·
New MSSQLHound updates from @_Mayyhem 🔥 Now includes EPA-based NTLM relay scanning, CVE-2025-49758 patch detection, and BloodHound Cypher queries to map + remediate MSSQL attack paths. Check it out! ghst.ly/4pKTgVI
English
1
31
83
8.2K
Chris Thompson
Chris Thompson@_Mayyhem·
I added a few things to MSSQLHound, including remote EPA (NTLM relay mitigation) checks based on RelayInformer by @Tw1sm and @zyn3rgy and some Cypher queries you can import into BloodHound to identify issues in MSSQL without writing them from scratch.
SpecterOps@SpecterOps

New MSSQLHound updates from @_Mayyhem 🔥 Now includes EPA-based NTLM relay scanning, CVE-2025-49758 patch detection, and BloodHound Cypher queries to map + remediate MSSQL attack paths. Check it out! ghst.ly/4pKTgVI

English
1
12
31
2.8K
Chris Thompson retweetledi
SpecterOps
SpecterOps@SpecterOps·
SCCM admins: review your roles. MSSQL admins: review ALTER ANY LOGIN exposure. @_Mayyhem details CVE-2025-47179 & CVE-2025-49758 and how these escalations can be identified through graph analysis. Check out his blog post for more! ghst.ly/49Fj4fM
English
0
34
81
5.2K
Chris Thompson retweetledi
cirosec GmbH
cirosec GmbH@cirosec·
This talk introduces two new OpenGraph collectors that expose lesser-known SCCM and MSSQL attack chains starting with initial access to gaining administrative control of the environment. @_Mayyhem walks through collection and visualization of these attack paths in the BloodHound graph and shows how to operationalize this tooling in real operations. #ITDefense
cirosec GmbH tweet media
English
0
1
2
233
Chris Thompson retweetledi
Logan Goins
Logan Goins@_logangoins·
Just released a new @SpecterOps blog! I discovered that during client push in SCCM env's it's possible to remotely start WebClient and coerce HTTP from site servers for a relay to LDAP resulting in hierarchy takeover when WebClient is installed! 🫠 specterops.io/blog/2026/01/1…
English
1
66
160
14.4K
SpecterOps
SpecterOps@SpecterOps·
SCCM attack paths are messy until you can see them. 👀 ConfigManBearPig from @_Mayyhem extends BloodHound with SCCM nodes + edges using OpenGraph, plus queries to surface hierarchy takeovers and escalation paths. Check it out! ghst.ly/4svbcWO
English
1
42
137
11.1K