Kevin Mandia, Founder of Mandiant, to Deliver Featured Keynote at SO-CON 2026. Learn More

  • Contact Us
  • Support
  • Blog
Book a Demo
  • Platform
    • BloodHound Enterprise

      Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale

      Identity Attack Path Management
      Privilege Zones
      BloodHound Feature Comparisons
      Integrations
      Interactive Demo
      APM Maturity Assessment Tool

      BloodHound Community Edition

      Start mapping attack paths with the open-source tool that started it all

      GitHub
      OpenGraph
      Documentation
      Join the Community on Slack

      The CISO’s Guide to Modern Identity Security

      A strategic framework for security leaders navigating the shift from reactive incident response to proactive attack path management.

      Read More
  • Services & Tradecraft
    • OFFENSIVE SERVICES

      Red Team
      Purple Team
      AI Red Team
      Penetration Testing
      Maturity Assessments
      Attack Path Assessment

      TRAINING & TRADECRAFT

      Adversary Tactics

      Red Team Operations
      Identity-Driven Offensive Tradecraft
      Detection
      Tradecraft Analysis

      Adversary Perspectives

      Active Directory
      Azure

      TRAININGS

      SO-CON 2026

      Master in-demand skills with our specialized courses at SO-CON 2026.

      Register Now
  • Solutions
    • SOLUTIONS

      Privileged Access Governance & Compliance
      Eliminate Lateral Movement
      Manage Identity Risk
      Secure Scaling
      Mergers & Acquisitions

      INDUSTRIES

      Public Sector
      Healthcare
      Financial Services

      PARTNERS & INTEGRATIONS

      Partners
      Integrations

      RESOURCES

      Attack Path Management Maturity Model

      Evaluate your ability to stop identity-based attacks

      Read the Whitepaper
  • Community
    • Our Commitment to 
Open Source

      Committed to advancing the community through open source contributions, cutting-edge research, and knowledge sharing

      OPEN SOURCE TOOLS

      BloodHound Community Edition
      Mythic
      Ghostwriter
      Nemesis 2.0
      See All Tools

      Join the Conversation

      Learn from others and share your story on the BloodHoundGang Slack Community

      Connect with us

      OPEN SOURCE RESEARCH

      Ghostwriter illustration

      Collaborative Editing

      Ghostwriter now supports real-time collaborative editing for observation...

      More Info
  • Company
    • ABOUT US

      Why SpecterOps
      News

      GET IN TOUCH

      Careers
      Contact Us

      PRESS RELEASE

      Specter Ops logo on a blue background

      SpecterOps and Tines Partner to Automate Attack Path Management with Native BloodHound Integration

      Learn More

      FEATURED EVENT

      SO-CON 2026

      Conference: April 13-14, 2026
      Training: April 15-18, 2026

      Register
  • Resources
    • RESEARCH

      Case Studies
      White Papers
      Tools
      Datasheets
      Podcasts
      View All

      BLOG

      Research & Tradecraft
      BloodHound
      Industry Insights
      Company Updates
      View All

      EVENTS

      SpecterOps Events
      SO-CON
      Webinars
      Meetups
      Talks
      View All

      BLOG

      Specter Ops logo on a blue background

      Fueling the Fight Against Identity Attacks

      When we founded SpecterOps, one of our core principles was to build a...

      Read article

      RESOURCES

      The Renaissance of NTLM Relay Attacks

      NTLM relay attacks have been around for a long time. While many security...

      Read the Whitepaper
  • Book a Demo
  • Contact Us
    Support
    Blog
  • Book a Demo
  • Platform
    • BloodHound Enterprise

      Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale

      Identity Attack Path Management
      Privilege Zones
      BloodHound Feature Comparisons
      Integrations
      Interactive Demo
      APM Maturity Assessment Tool

      BloodHound Community Edition

      Start mapping attack paths with the open-source tool that started it all

      GitHub
      OpenGraph
      Documentation
      Join the Community on Slack

      The CISO’s Guide to Modern Identity Security

      A strategic framework for security leaders navigating the shift from reactive incident response to proactive attack path management.

      Read More
  • Services & Tradecraft
    • OFFENSIVE SERVICES

      Red Team
      Purple Team
      AI Red Team
      Penetration Testing
      Maturity Assessments
      Attack Path Assessment

      TRAINING & TRADECRAFT

      Adversary Tactics

      Red Team Operations
      Identity-Driven Offensive Tradecraft
      Detection
      Tradecraft Analysis

      Adversary Perspectives

      Active Directory
      Azure

      TRAININGS

      SO-CON 2026

      Master in-demand skills with our specialized courses at SO-CON 2026.

      Register Now
  • Solutions
    • SOLUTIONS

      Privileged Access Governance & Compliance
      Eliminate Lateral Movement
      Manage Identity Risk
      Secure Scaling
      Mergers & Acquisitions

      INDUSTRIES

      Public Sector
      Healthcare
      Financial Services

      PARTNERS & INTEGRATIONS

      Partners
      Integrations

      RESOURCES

      Attack Path Management Maturity Model

      Evaluate your ability to stop identity-based attacks

      Read the Whitepaper
  • Community
    • Our Commitment to 
Open Source

      Committed to advancing the community through open source contributions, cutting-edge research, and knowledge sharing

      OPEN SOURCE TOOLS

      BloodHound Community Edition
      Mythic
      Ghostwriter
      Nemesis 2.0
      See All Tools

      Join the Conversation

      Learn from others and share your story on the BloodHoundGang Slack Community

      Connect with us

      OPEN SOURCE RESEARCH

      Ghostwriter illustration

      Collaborative Editing

      Ghostwriter now supports real-time collaborative editing for observation...

      More Info
  • Company
    • ABOUT US

      Why SpecterOps
      News

      GET IN TOUCH

      Careers
      Contact Us

      PRESS RELEASE

      Specter Ops logo on a blue background

      SpecterOps and Tines Partner to Automate Attack Path Management with Native BloodHound Integration

      Learn More

      FEATURED EVENT

      SO-CON 2026

      Conference: April 13-14, 2026
      Training: April 15-18, 2026

      Register
  • Resources
    • RESEARCH

      Case Studies
      White Papers
      Tools
      Datasheets
      Podcasts
      View All

      BLOG

      Research & Tradecraft
      BloodHound
      Industry Insights
      Company Updates
      View All

      EVENTS

      SpecterOps Events
      SO-CON
      Webinars
      Meetups
      Talks
      View All

      BLOG

      Specter Ops logo on a blue background

      Fueling the Fight Against Identity Attacks

      When we founded SpecterOps, one of our core principles was to build a...

      Read article

      RESOURCES

      The Renaissance of NTLM Relay Attacks

      NTLM relay attacks have been around for a long time. While many security...

      Read the Whitepaper
  • Book a Demo
  • Contact Us
    Support
    Blog
  • Book a Demo
< Back to Blog
Default Author Image

Forrest Kasler

See the latest by Forrest Kasler

Image for post titled Epic Pentest Fail

Epic Pentest Fail

How to Wreck Entra with a Single Mistyped Character This is a cautionary tale. Always read...

By: Forrest Kasler
Oct 30, 2025 • 8 min read
Read Post
Image for post titled Teach a Man to Phish

Teach a Man to Phish

PHISHING SCHOOL A Decade of Distilled Phishing Wisdom I decided to give away all of my phishing...

By: Forrest Kasler
Aug 21, 2024 • 5 min read
Read Post
Image for post titled Sleeping With the Phishes

Sleeping With the Phishes

Hiding C2 With Stealthy Callback Channels Write a custom command and control (C2) implant — Check...

By: Forrest Kasler
Aug 14, 2024 • 12 min read
Read Post
Image for post titled Deep Sea Phishing Pt. 2

Deep Sea Phishing Pt. 2

PHISHING SCHOOL Making Your Malware Look Legit to Bypasses EDR I wanted to write this blog about...

By: Forrest Kasler
Jul 30, 2024 • 8 min read
Read Post
Image for post titled Deep Sea Phishing Pt. 1

Deep Sea Phishing Pt. 1

PHISHING SCHOOL How to Bypass EDR With Custom Payloads If endpoint detection and response (EDR) protections keep...

By: Forrest Kasler
Jul 23, 2024 • 17 min read
Read Post
Image for post titled Phish Out of Water

Phish Out of Water

PHISHING SCHOOL Bypassing Web Proxies so Your Phish Don’t Suffocate You just fought long and hard...

By: Forrest Kasler
Jul 16, 2024 • 13 min read
Read Post
Image for post titled Drink Like a Phish

Drink Like a Phish

PHISHING SCHOOL How to Make Your Phishing Sites Blend In As you read this, bots are coming...

By: Forrest Kasler
Jul 9, 2024 • 12 min read
Read Post
Image for post titled Like Shooting Phish in a Barrel

Like Shooting Phish in a Barrel

PHISHING SCHOOL Bypassing Link Crawlers You’ve just convinced a target user to click your link. In doing...

By: Forrest Kasler
Jul 2, 2024 • 14 min read
Read Post
Image for post titled I Will Make you Phishers of Men

I Will Make you Phishers of Men

PHISHING SCHOOL Convincing Targets to Click Your Links When it comes to phishing advice, the number one...

By: Forrest Kasler
Jun 25, 2024 • 21 min read
Read Post
1 2 Next

Never miss an update

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Sign Up For Updates From SpecterOps

Platform

BloodHound Enterprise

Identity Attack Path Management
Privilege Zones
BloodHound Feature Comparison
Integrations
Interactive Demo

BloodHound Community Edition

GitHub
OpenGraph
Documentation
Join the Community on Slack

Services and Tradecraft

OFFENSIVE SERVICES

Red Team
Purple Team
AI Red Team
Penetration Testing
Maturity Assessments
Attack Path Assessment

TRAINING & TRADECRAFT

Adversary Tactics

Red Team Operations
Identity-Driven Offensive Tradecraft
Detection
Tradecraft Analysis

Adversary Perspectives

Active Directory
Azure

Solutions

SOLUTIONS

Privileged Access Governance and Compliance
Eliminate Lateral Movement
Manage Identity Risk
Secure Scaling
Mergers & Acquisitions

INDUSTRIES

Public Sector
Healthcare
Financial Services

PARTNERS & INTEGRATIONS

Partners
Integrations

Resources

RESEARCH

Case Studies
White Papers
Tools
Datasheets
Podcasts
View All

BLOG

Research & Tradecraft
BloodHound
Industry Insights
Company Updates
View All

EVENTS

SpecterOps Events
Webinars
Meetups
Talks
View All

Platform

BloodHound Enterprise

Identity Attack Path Management
Privilege Zones
BloodHound Feature Comparison
Integrations
Interactive Demo

BloodHound Community Edition

GitHub
OpenGraph
Documentation
Join the Community on Slack

Follow Us

Company

ABOUT US

Why SpecterOps
News

GET IN TOUCH

Careers
Contact Us

Community

OPEN SOURCE TOOLS

Our Commitment to Open Source
BloodHound Community Edition
Mythic
Ghostwriter
Nemesis 2.0
See All Tools

Follow Us

Copyright 2026 Specter Ops, Inc. All Rights Reserved.

Terms of Service
|
Privacy Policy
|
Trust Center