Research

Detection and Mitigation Advice for PrintNightmare

Detection and Mitigation Advice for PrintNightmare 2048 1365 Andy Gill

Introduction PrintNightmare(CVE-2021-34527) was released as a proof of concept this week on Github. This post highlights how the exploit PoCs released on Github work and how the specific vulnerability can…

read more

Introducing Sysmon Config Pusher

Introducing Sysmon Config Pusher 1026 685 Anton Ovrutsky

Introducing Sysmon Config Pusher When providing various services to clients, including Purple, Blue, and Red Team engagements, the Lares team often recomends Sysmon to close detection gaps. Indeed, Sysmon is…

read more

Active Directory (AD) Attacks & Enumeration at the Network Layer

Active Directory (AD) Attacks & Enumeration at the Network Layer 2048 1365 Anton Ovrutsky

Intro Defending an Active Directory environment, particularly a large one, is a daunting task. Telemetry generated by Active Directory itself as well as the hosts connected to it are critical…

read more

Malicious Azure AD Application Registrations

Malicious Azure AD Application Registrations 1090 726 Lee Kagan

Background It’s important I point out upfront that nothing I am demonstrating I can take credit for. Evidence of this used in the wild was talked about as mentioned here…

read more

Lares Contributes to the Verizon DBIR

Lares Contributes to the Verizon DBIR 833 833 Andrew Hay

Another year has passed and that means that it’s time for the annual Verizon Data Breach Investigations Report (DBIR). In its 13th year, the DBIR provides data from real-world breaches…

read more

Upcoming Webinar: Purple Teaming with ATT&CK

Upcoming Webinar: Purple Teaming with ATT&CK 300 300 Andrew Hay

  Join us on May 6th to learn how can teams come together on both offense and defense to outmatch the highest priority threats. This open and frank discussion featuring…

read more

The Top 10 Penetration Test Findings from 2019 with Eric Smith and Tim McGuffin

The Top 10 Penetration Test Findings from 2019 with Eric Smith and Tim McGuffin 1080 720 Andrew Hay

Lares® encounters a seemingly endless number of vulnerabilities and attack vectors when we conduct a penetration test or red team engagement, regardless of organization size or maturity. Though not every…

read more

Hunting Azure Admins for Vertical Escalation: Part 2

Hunting Azure Admins for Vertical Escalation: Part 2 1360 1068 Andrew Hay

  This post is part 2 in the Hunting Azure Admins for Vertical Escalation series. Part 1 of this series detailed the usage and functionality of Azure authentication tokens, file…

read more

Hunting Azure Admins for Vertical Escalation

Hunting Azure Admins for Vertical Escalation 2048 1402 Lee Kagan

In this post, we will look at a rather simple, but important procedure when attacking organizations that leverage cloud providers such as Microsoft Azure. There is a lot of excellent…

read more

Use-After-Free (UAF) Vulnerability CVE-2019-1199 in Microsoft Outlook

Use-After-Free (UAF) Vulnerability CVE-2019-1199 in Microsoft Outlook 2048 1536 Andrew Hay

Overview R.J. McDown (@BeetleChunks) of the Lares® Research and Development Team discovered a Critical Remote Code Execution vulnerability in the latest version of Microsoft Outlook. R.J. and the Lares R&D…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2019 Lares, LLC | All rights reserved.
Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.