Compass Security

Compass Security Offensive Defense

Compass Security Blog Offensive Defense

  • Stealthy AD CS Reconnaissance
    by Marc Tanner on February 11, 2025 at 8:00 am

    Introducing a certipy parse command to perform stealthy offline AD CS enumeration based on local registry data.

  • BloodHound Community Edition Custom Queries
    by Emanuel Duss on January 28, 2025 at 1:30 pm

    This blog post introduces our new custom queries for BloodHound Community Edition (CE) and explains how you can use them effectively to analyze your Active Directory infrastructure. TL;DR: Check out our new BloodHound CE custom queries! Active Directory and BloodHound The majority of our customers run a Microsoft Active Directory infrastructure, either exclusively on-prem or

  • Hitchhiker’s Guide to Managed Security
    by Felix Aeppli on January 14, 2025 at 8:00 am

    Over the past few years, we have had the opportunity to conduct several Purple Teaming exercises together with our customers. Particularly after Purple Teaming exercises involving external providers, we often see a mismatch between the customer’s expectations and the service provided. This blog post attempts to summarize how to prevent the most prevalent issues with a managed security service as early as possible.

  • A Nifty Initial Access Payload
    by Sylvain Heiniger on December 17, 2024 at 9:00 am

    Red Teaming engagements are “realistic” attack simulations designed to test the security posture of an organization and its Blue Team. This term is used in many different ways, so if you’re not sure where to draw the line, Michael Schneier’s latest blog post provides a good comparison of different types of assessment. Anyway, when doing

  • Harvesting GitLab Pipeline Secrets
    by Jan Friedli on December 3, 2024 at 8:00 am

    TLDR: Scan GitLab job logs for credentials using https://github.com/CompassSecurity/pipeleak Many organizations use (self-hosted) GitLab instances to manage their source code and a lot of infrastructure is managed in code (IaC), thus these configurations must be source-controlled as well, putting a lot of responsibility on the source code platform in use. Often deployments are automated using CI/CD

  • A Look Back: Insights from Our Managed Bug Bounty Program
    by Fabio Poloni on November 21, 2024 at 2:00 pm

    At Compass Security, we are proud to offer a fully managed bug bounty program tailored to the needs of both SMEs and larger enterprises. From scoping to payout, we manage every aspect of the process to ensure a seamless experience for our customers and valued hunters. In this blog post, we’ll take a look at our journey since the launch of our service in October 2023, highlighting key milestones, metrics and learnings gathered along the way.

  • Email, Email on the Wall, Who Sent You, After All?
    by Andreas Arnold on October 29, 2024 at 8:00 am

    During Business Email Comproise (BEC) engagements we often have to analyze the provenance of emails. According to the FBI’s Internet Crime Report, BEC is one of the most financially damaging attacks, even surpassing ransomware in terms of losses. But how can we know all of this? Through email headers! This blog post tries to shed some light on the information contained within emails, what it means, and what can be done to prevent this type of attack.

  • Voice  Cloning with Deep Learning Models
    by Nicolo Fornari on October 18, 2024 at 7:00 am

    Given the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how and find applications where these technologies can be leveraged in offensive security engagements. This posts explores the use of machine learning for voice cloning and how it can be used for social engineering.

  • COM Cross-Session Activation
    by Sylvain Heiniger on October 1, 2024 at 7:00 am

    Once again, reading blogs and tweets from James Forshaw led me to wonder how things work. This time, I was working on DCOM for my last blog post and while reading about cross-session activation, I had trouble believing what I was reading.

  • Three-Headed Potato Dog
    by Sylvain Heiniger on September 17, 2024 at 1:30 pm

    Earlier this year, several security researchers published research about using DCOM to coerce Windows systems to authenticate to other systems. This can be misused to relay the authentication to NTLM or Kerberos, to AD CS over HTTP for instance. This sounds like a hot and complex topic. Let’s take a look back how this started

Share Websitecyber