Lee Robinson

7 posts

Lee Robinson

Lee Robinson

@rbnroot

Katılım Eylül 2025
79 Takip Edilen38 Takipçiler
Lee Robinson retweetledi
Max Andreacchi
Max Andreacchi@atomicchonk·
Absolutely loved doing this research and I’m beyond excited to share it with you all! You never know what’ll shake out if you try to “con the bot” 🤖 #ai #cyber
SpecterOps@SpecterOps

AI models are trained to agree with you. What if that’s the vulnerability? @atomicchonk explored Claude’s sycophancy and uncovered signs of a dual-agent architecture, including a stateless secondary instance. Check it out! ⤵️ ghst.ly/4qWu3Ic

English
0
2
6
2.6K
Lee Robinson retweetledi
Lukas Klein | @rantasec.bsky.social
Check out GoLinHound: - Discovers Linux & SSH attack paths - Outputs OpenGraph JSON for BloodHound ingestion - Integrates with SharpHound and AzureHound data to unveil cross-technology attack paths github.com/RantaSec/golin…
English
2
33
75
4K
Lee Robinson retweetledi
SpecterOps
SpecterOps@SpecterOps·
Adversaries don’t hunt for “passwords.txt.” They abuse what’s already there. @Praga_Prag's latest blog shows how to turn SCCM attack paths into high-signal deception opportunities using BloodHound OpenGraph. ghst.ly/4tuAjJJ
English
0
14
58
11.8K
Lee Robinson
Lee Robinson@rbnroot·
@mattdep_ @SpecterOps I definitely think that’s something that could happened. Especially with OpenGraph. Off the top of my head, it shouldn’t be too hard to map which policies include or exclude users, roles, and groups. Would have to think on handling conditions though.
English
0
0
0
56
Matt D
Matt D@mattdep_·
@SpecterOps @rbnroot Do you plan to add the collection of CAPs to AzureHound and support CAP visualizations in BloodHound?
English
1
0
0
779
Lee Robinson retweetledi
SpecterOps
SpecterOps@SpecterOps·
Every Entra ID assessment ends here: “How do I get a token without triggering Conditional Access controls?” 🤔 @rbnroot built CAPSlock, an offline ROADrecon-based Conditional Access engine that simulates sign-ins & flags gaps without touching the tenant. ghst.ly/4aKIk64
English
3
89
279
28.4K
Lee Robinson retweetledi
SpecterOps
SpecterOps@SpecterOps·
Identity risk isn’t just about who has access. It’s about how access connects. @jaredcatkinson dives into how Attack Path Management reframes modern security strategy in his article for @IdentityWeek_ID. ghst.ly/4txClZI
English
0
7
14
1.8K
Lee Robinson
Lee Robinson@rbnroot·
@mrmichaeljstew @SpecterOps That’s exactly what I was going for! While I could have added the ability to pull down the policies all within the tool, I found that it made more sense to just build on top of ROADrecon since in almost always using it to conduct entra analysis anyways
English
0
0
0
31
Michael Stewart
Michael Stewart@mrmichaeljstew·
@SpecterOps @rbnroot The offline simulation angle is the key differentiator here. In environments where you can't do live testing against prod tenants — which is most of higher ed — CAPSlock closes a real gap. The ROADrecon dependency is worth noting for teams still building out their toolchain.
English
1
0
4
1K