Protect mission-critical assets from identity compromise with new Privilege Zones in BloodHound Enterprise. Learn More

  • Blog
  • Support
  • Contact Us
    • Blog
    • Support
    • Contact Us
  • Services
    • PROGRAM DEVELOPMENT
      • Overview
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessments
      • Artificial Intelligence Red Team
  • Products
    • BLOODHOUND
      • BloodHound Community Edition
        • Overview
        • BloodHound Feature Comparisons
        • GitHub
        • Get Started
      • BloodHound Enterprise
        • Overview
          • What is Attack Path Management?
          • Interactive Demos
          • BloodHound Feature Comparisons
          • Privilege Zones
        • Use Cases
          • Privileged Access Governance and Compliance
          • Scaling Beyond BloodHound Community Edition
          • Eliminate Lateral Movement
          • Manage Identity Risk
          • Mergers and Acquisitions
        • Industry
          • Public Sector
          • Financial Services
          • Healthcare
        • Support
        • Get a Demo
    • Go to Slack
    • Go to Docs
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
    • Private Training
      • Talk to us
  • Partners
    • SpecterOps Partner Program
    • Identify your customers attack paths before attackers do
      • Become a Partner
      • Partner Portal Sign In
  • About
    • ABOUT US
      • Who We Are
      • Values
      • Team
      • Careers
      • Contact Us
  • News
    • Announcements
    • Newsroom
  • Resources
    • RESOURCES
      • Blog
      • Research & Insights
      • White Papers
      • Case Studies
      • Sponsored Tools
      • Vulnerability Acknowledgements
      • Datasheets
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Get a Demo
Get a Demo
< Back to Blog
Default Author Image

Andy Robbins

See the latest by Andy Robbins

Image for post titled Abusing Azure App Service Managed Identity Assignments

Abusing Azure App Service Managed Identity Assignments

Intro Azure App Service is a Platform-as-a-Service product that promises to improve web application deployment, hosting,...

By: Andy Robbins
Feb 15, 2023 • 11 min read
Read Post
Image for post titled Passwordless Persistence and Privilege Escalation in Azure

Passwordless Persistence and Privilege Escalation in Azure

Adversaries are always looking for stealthy means of maintaining long-term and stealthy persistence and privilege in...

By: Andy Robbins
Dec 21, 2022 • 16 min read
Read Post
Image for post titled Automating Azure Abuse Research — Part 2

Automating Azure Abuse Research — Part 2

By: Andy Robbins
Aug 31, 2022 • 8 min read
Read Post
Image for post titled Introducing BloodHound 4.2 — The Azure Refactor

Introducing BloodHound 4.2 — The Azure Refactor

Introducing BloodHound 4.2 — The Azure Refactor The BloodHound Enterprise team is proud to announce the release of BloodHound...

By: Andy Robbins
Aug 3, 2022 • 8 min read
Read Post
Image for post titled Managed Identity Attack Paths, Part 3: Function Apps

Managed Identity Attack Paths, Part 3: Function Apps

Intro and Prior Work In this three part blog series we have explored attack paths that emerge...

By: Andy Robbins
Jun 8, 2022 • 10 min read
Read Post
Image for post titled Managed Identity Attack Paths, Part 2: Logic Apps

Managed Identity Attack Paths, Part 2: Logic Apps

Intro and Prior Work In this three part blog series we are exploring attack paths that emerge...

By: Andy Robbins
Jun 7, 2022 • 9 min read
Read Post
Image for post titled Managed Identity Attack Paths, Part 1: Automation Accounts

Managed Identity Attack Paths, Part 1: Automation Accounts

Intro and Prior Work In this three part blog series we will explore attack paths that emerge...

By: Andy Robbins
Jun 6, 2022 • 12 min read
Read Post
Image for post titled Automating Azure Abuse Research — Part 1

Automating Azure Abuse Research — Part 1

Automating Azure Abuse Research — Part 1 Intro Back in February of 2020 Karl Fosaaen published a great blog...

By: Andy Robbins
May 25, 2022 • 7 min read
Read Post
Image for post titled Abusing Azure Container Registry Tasks

Abusing Azure Container Registry Tasks

Intro and Prior Work More and more organizations are adopting cloud computing, migrating existing business processes and...

By: Andy Robbins
Apr 20, 2022 • 17 min read
Read Post
Prev 1 2 3 4 Next
Demystifying Adversary Tradecraft
Sign Up For Updates From SpecterOps
  • Sign Up For Updates From SpecterOps

  • This field is for validation purposes and should be left unchanged.

  • Services
    • Program Development
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessment
      • Artificial Intelligence Red Team
  • Products
    • BloodHound Community Edition
      • Overview
        • BloodHound Feature Comparison
      • GitHub
      • Get Started
    • BloodHound Enterprise
      • Overview
        • What is Attack Path Management?
        • Interactive Demos
        • BloodHound Feature Comparison
      • Use Cases
        • Privileged Access Governance and Compliance
        • Scaling Beyond BloodHound Community Edition
        • Eliminate Lateral Movement
        • Manage Identity Risk
        • Mergers and Acquisitions
      • Industry
        • Public Sector
        • Financial Services
        • Healthcare
      • Support
      • Get a Demo
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
      • Private Training
  • News
    • Announcements
    • Newsroom
  • About Us
    • Who We Are
    • Values
    • Team
    • Careers
    • Contact Us
  • Resources
    • White Papers
    • Case Studies
    • Sponsored Tools
    • Vulnerability Acknowledgements
    • Datasheets
  • Blog
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Great Place to Work

Copyright 2025 Specter Ops, Inc. All Rights Reserved.

Terms of Service Privacy Policy Trust Center