Protect mission-critical assets from identity compromise with new Privilege Zones in BloodHound Enterprise. Learn More

  • Blog
  • Support
  • Contact Us
    • Blog
    • Support
    • Contact Us
  • Services
    • PROGRAM DEVELOPMENT
      • Overview
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessments
      • Artificial Intelligence Red Team
  • Products
    • BLOODHOUND
      • BloodHound
        Community Edition
        • Overview
        • BloodHound Feature Comparisons
        • GitHub
        • Get Started
      • BloodHound
        Enterprise
        • Overview
          • What is Attack Path Management?
          • Interactive Demos
          • BloodHound Feature Comparisons
          • Privilege Zones
        • Use Cases
          • Privileged Access Governance and Compliance
          • Scaling Beyond BloodHound Community Edition
          • Eliminate Lateral Movement
          • Manage Identity Risk
          • Mergers and Acquisitions
        • Industry
          • Public Sector
          • Financial Services
          • Healthcare
        • Support
        • Get a Demo
    • Go to Slack
    • Go to Docs
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
    • Private Training
      • Talk to us
  • Partners
    • SpecterOps
      Partner Program
    • Identify your customers attack paths
      before attackers do
      • Become a Partner
      • Partner Portal Sign In
  • About
    • ABOUT US
      • Who We Are
      • Values
      • Team
      • Careers
      • Contact Us
  • News
    • Announcements
    • Newsroom
  • Resources
    • RESOURCES
      • Blog
      • Research & Insights
      • White Papers
      • Case Studies
      • Sponsored Tools
      • Vulnerability Acknowledgements
      • Datasheets
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Get a Demo
Get a Demo
< Back to Blog
Default Author Image

Jonas Bülow Knudsen

See the latest by Jonas Bülow Knudsen

Image for post titled ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated...

By: Jonas Bülow Knudsen
Sep 11, 2024 • 22 min read
Read Post
Image for post titled ADCS Attack Paths in BloodHound — Part 2

ADCS Attack Paths in BloodHound — Part 2

ADCS Attack Paths in BloodHound — Part 2 In Part 1 of this series, we explained how we incorporated...

By: Jonas Bülow Knudsen
May 1, 2024 • 13 min read
Read Post
Image for post titled Pwned by the Mail Carrier

Pwned by the Mail Carrier

How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that. At SpecterOps,...

By: Jonas Bülow Knudsen
Mar 20, 2024 • 28 min read
Read Post
Image for post titled ADCS ESC14 Abuse Technique

ADCS ESC14 Abuse Technique

The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate...

By: Jonas Bülow Knudsen
Feb 28, 2024 • 38 min read
Read Post
Image for post titled ADCS ESC13 Abuse Technique

ADCS ESC13 Abuse Technique

It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance...

By: Jonas Bülow Knudsen
Feb 14, 2024 • 15 min read
Read Post
Image for post titled ADCS Attack Paths in BloodHound — Part 1

ADCS Attack Paths in BloodHound — Part 1

ADCS Attack Paths in BloodHound — Part 1 Since Will Schroeder and Lee Christensen published the Certified Pre-Owned whitepaper,...

By: Jonas Bülow Knudsen
Jan 24, 2024 • 16 min read
Read Post
Image for post titled What is Tier Zero — Part 2

What is Tier Zero — Part 2

What is Tier Zero — Part 2 Round 2! This is Part 2 of our webinar and blog post...

By: Jonas Bülow Knudsen
Sep 14, 2023 • 13 min read
Read Post
Image for post titled What is Tier Zero — Part 1

What is Tier Zero — Part 1

What is Tier Zero — Part 1 Tier Zero is a crucial group of assets in Active Directory (AD)...

By: Jonas Bülow Knudsen
Jun 22, 2023 • 14 min read
Read Post
Image for post titled FOSS BloodHound 4.3.1 release

FOSS BloodHound 4.3.1 release

We are excited to share the release of BloodHound version 4.3.1. We have accepted a lot...

By: Jonas Bülow Knudsen
May 23, 2023 • 3 min read
Read Post
1 2 Next
Demystifying Adversary Tradecraft
Sign Up For Updates From SpecterOps
  • Sign Up For Updates From SpecterOps

  • This field is for validation purposes and should be left unchanged.

  • Services
    • Program Development
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessment
      • Artificial Intelligence Red Team
  • Products
    • BloodHound Community Edition
      • Overview
        • BloodHound Feature Comparison
      • GitHub
      • Get Started
    • BloodHound Enterprise
      • Overview
        • What is Attack Path Management?
        • Interactive Demos
        • BloodHound Feature Comparison
      • Use Cases
        • Privileged Access Governance and Compliance
        • Scaling Beyond BloodHound Community Edition
        • Eliminate Lateral Movement
        • Manage Identity Risk
        • Mergers and Acquisitions
      • Industry
        • Public Sector
        • Financial Services
        • Healthcare
      • Support
      • Get a Demo
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
      • Private Training
  • News
    • Announcements
    • Newsroom
  • About Us
    • Who We Are
    • Values
    • Team
    • Careers
    • Contact Us
  • Resources
    • White Papers
    • Case Studies
    • Sponsored Tools
    • Vulnerability Acknowledgements
    • Datasheets
  • Blog
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Great Place to Work

Copyright 2025 Specter Ops, Inc. All Rights Reserved.

Terms of Service Privacy Policy Trust Center