10 years ago this week I published this blog post while @cptjesus.bsky.social, @harmj0y.bsky.social and I were working on what eventually became BloodHound: wald0.com?p=14
17.02.2026 16:45 β π 6 π 2 π¬ 0 π 010 years ago this week I published this blog post while @cptjesus.bsky.social, @harmj0y.bsky.social and I were working on what eventually became BloodHound: wald0.com?p=14
17.02.2026 16:45 β π 6 π 2 π¬ 0 π 0
In today's #BloodHoundBasics, @sadprocessor.bsky.social
highlights a powerful new feature you mightβve missed: Cypher Selectors for Privilege Zones.
Why powerful? Unlike classic objectid selectors, Cypher selectors use complex conditions & can be created before the node exists.
π§΅: 1/3
Seattle politics nerds explaining the next week of ballot counting
07.11.2025 00:07 β π 106 π 20 π¬ 2 π 5Introducing PingOneHound! This OpenGraph extension for BloodHound can help you identify, analyze, execute, and remediate attack paths in PingOne organizations. Read the introductory blog post here: specterops.io/blog/2025/10...
20.10.2025 17:43 β π 9 π 10 π¬ 0 π 0Someone told me recently that they think the Internet is the Great Filter and I don't know how I feel right now
16.09.2025 18:24 β π 1 π 1 π¬ 0 π 0Lots of cool new Nemesis features merging in soon from @tifkin_ and I! Development definitely didn't stop with the 2.0 release :) github.com/SpecterOps/N...
16.09.2025 19:07 β π 5 π 1 π¬ 0 π 0HACK THE PLANET!
10.08.2025 17:01 β π 4 π 2 π¬ 0 π 0A relatively unknown but particularly stealthy technique to hide files on Linux hosts. On unhardened boxes, unprivileged users can conceal files from even the root user. Disk content remains in memory, hindering disk acquisition during forensic investigation. (1/7) π
13.07.2025 07:39 β π 6 π 1 π¬ 2 π 0Andy Robbins: The Evolution of Bloodhound podcasters.spotify.c...
01.07.2025 16:57 β π 4 π 1 π¬ 0 π 0Happy Friday! @tifkin.bsky.social and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG for a (brief) summary of changes, and dive into our new docs for more detail! We're extremely proud and excited for this release github.com/SpecterOps/N...
28.06.2025 04:14 β π 12 π 6 π¬ 0 π 0
I publish two blog posts today! ππ«
First dives into how we're improving the way BloodHound models attack paths through AD trusts: specterops.io/blog/2025/06...
Second covers an attack technique I came across while exploring AD trust abuse: specterops.io/blog/2025/06...
Hope you enjoy the read π₯³
#PSConfEU 2026
26.06.2025 13:14 β π 14 π 8 π¬ 0 π 0Sean Metcalf: Active Directory Security podcasters.spotify.c...
26.06.2025 17:38 β π 2 π 1 π¬ 0 π 0
Sentiment analysis models are used to assess conventional use of language, but what happens when you engage with them using l33tspeak?
@atomicchonk.bsky.social digs into what happens if we employ this in adversarial text attacks against AI models.
Read more π ghst.ly/4kW2D37
Ghostwriter v6's new collaborative editing feature is π₯
Alex Parrill & @printingprops.com discuss the new real-time collaborative editing for observations, findings, & report fields, enabling multiple users to edit simultaneously without overwriting each other. ghst.ly/4jVqdvG
π¨ New blog post alert!
@xpnsec.com drops knowledge on LLM security w/ his latest post showing how attackers can by pass LLM WAFs by confusing the tokenization process to smuggle tokens to back-end LLMs.
Read more: ghst.ly/4koUJiz
Even well-resourced orgs remain vulnerable to NTLM relay attacks. Join @tifkin.bsky.social, @harmj0y.bsky.social, & @cptjesus.bsky.social for our upcoming webinar as they discuss their research into modeling these attacks within BloodHound.
Register today! β‘οΈ ghst.ly/ntlm-web-bsky
Think NTLM relay is a solved problem? Think again.
Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31
In our latest blog post, @xpnsec.com breaks down how SQL Server Transparent Data Encryption works, shares new methods for brute-forcing database encryption keys, & reveals a default key used by ManageEngine's ADSelfService product backups.
Read more π ghst.ly/4iXFTyF
If you missed the session on NTLM at #SOCON2025, you're in luck! Join @tifkin.bsky.social, @cptjesus.bsky.social, and @harmj0y.bsky.social on April 17 for a webinar discussing their research into modeling NTLM relay attacks within BloodHound.
Register today! β‘οΈ ghst.ly/ntlm-web
Itβs time! #SOCON2025 is kicking off now. π₯³
Grab your badge & t-shirt and join your fellow conference attendees for breakfast. Follow along here for todayβs schedule of events & use our hashtag to share your own updates!
Accurately see what permissions are exploitable in your AD environment. Chris Thompson discusses a recent update in BloodHound that shows fewer false positives for Owns/WriteOwner edges, & introduces the new Owns/WriteOwnerLimitedRights edges.
Read more: ghst.ly/3QORQdF
Some of my starts, continued by Fortra, hit a milestone recently. They reduced non-attrib CS servers world-wide by 80% over 2 years
www.cobaltstrike.com/blog/update-...
LONG road. I partnered with Microsoft. 2018. I had TI process to track non-attrib CS servers. 2019. Fortra's novel lawfare. 2022
#SCCM forest discovery accounts can be decryptedβeven those for untrusted forests. If the site server is a managed client, all creds can be decrypted via Administration Service API.
Check out our latest blog post from @unsignedsh0rt.bsky.social to learn more. ghst.ly/4buoISp
[BLOG]
I had a series in mind like "Rubeus' Hidden Secrets" or something like that. Basically, highlighting features of the tool that seem less well known. I'm starting off with a basic one for getting crackable hashes from cached service tickets.
rastamouse.me/kerberoastin...
SlackPirate sets sail again! π΄ββ οΈ
In his latest blog post, Dan Mayer intros his new PR to SlackPirate that lets you loot Slack again out of the box, a BOF to get you all the data you need to do it, & how to bee the most active slacker in your group chat. π ghst.ly/4hgwMIt
Part 2 of @hotnops.bsky.social's blog series on Entra Connect attacker tradecraft has dropped! π Check out this installment to learn more fundamentals of the Entra sync engine & how to interpret the sync rules. ghst.ly/3WqAQO4
22.01.2025 19:39 β π 11 π 6 π¬ 0 π 0
Introducing a new tool designed to help you install & manage BloodHound instances...π₯ BloodHound CLI!
Check out @printingprops.com's blog post to learn how this tool dramatically simplifies installation and server management. ghst.ly/40zXAxI
In Part 1 of my Intune Attack Paths series, I discuss the fundamental components and mechanics of Intune that lead to the emergence of attack paths: posts.specterops.io/intune-attac...
15.01.2025 17:33 β π 42 π 19 π¬ 2 π 0