Services
PROGRAM DEVELOPMENT
Overview
Developing Capabilities
Expert Support
Assessments
Penetration Testing
Red Team Engagements
Purple Team Assessments
Maturity Assessments
Solutions
BloodHound Enterprise
Training
Adversary Tactics Training Courses
Red Team Operations
Tradecraft Analysis
Mac Tradecraft
Detection
Vulnerability Research for Operators
Active Directory Security Fundamentals
Private Training
Talk to us
About
ABOUT
Who We Are
Values
Team
Careers
News
Announcements
Media
Resources
Recent Posts
White Papers
Sponsored Tools
Vulnerability Acknowledgements
Datasheets
Blog
Events
Sponsored Events
Talks
Training Courses
Webinars
Contact Us
FEATURED BLOG
Introducing BloodHound 4.3 — Get Global Admin More Often
Read Post
All
Blog
Research
Solutions
Search
Blog
All Posts
0 Min Read | Aug 31
Automating Azure Abuse Research — Part 2
13 Min Read | Aug 18
On Detection: Tactical to Functional
Part 5: Expanding the Operation Graph Welcome back to the On Detection: Tactical to Functional blog series. Previously we discussed operations and sequences of operations that I call operation paths. [...]
0 Min Read |
On Detection: Tactical to Functional
10 Min Read | Aug 16
On Detection: Tactical to Functional
Part 4: Compound Functions Introduction Welcome back to the On Detection: Tactical to Functional series (links to all posts are at the bottom of the post). Thus far, we’ve explored [...]
13 Min Read | Aug 09
On Detection: Tactical to Functional
Part 3: Expanding the Function Call Graph Introduction In the previous post in this series, I introduced the concept of operations and demonstrated how each operation has a function call graph [...]
8 Min Read | Aug 04
On Detection: Tactical to Functional
Part 2: Operations Introduction Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. [...]
6 Min Read | Aug 03
Introducing BloodHound 4.2 — The Azure Refactor
Introducing BloodHound 4.2 — The Azure Refactor The BloodHound Enterprise team is proud to announce the release of BloodHound 4.2 — The Azure Refactor. The primary authors of BloodHound 4.2 are Dillon Lees (@ddlees), Rohan [...]
4 Min Read | Jul 20
Encrypting Strings at Compile Time
Thank you to SpecterOps for supporting this research and to Duane and Matt for proofreading and editing! Crossposted on GitHub. TLDR: You may use this header file for reliable compile time [...]
19 Min Read | Jul 19
On Detection: Tactical to Functional
Part 1: Discovering API Function Usage through Source Code Review Welcome to my new blog series, “On Detection: Tactical to Functional,” where I intend to explore and expand my understanding of [...]
PREV
1
2
3
4
5
6
7
8
NEXT
Get Started
Defend Against
Advanced Attacks
Talk to an Expert