Introducing BloodHound Scentry: Accelerate your APM practice. Learn More

  • Contact Us
  • Support
  • Blog
SpecterOps
Book a Demo
  • Platform
    • BloodHound Enterprise

      Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale

      Identity Attack Path Management
      Privilege Zones
      BloodHound Scentry
      Integrations
      Interactive Demo
      APM Maturity Assessment Tool

      BloodHound Community Edition

      Start mapping attack paths with the open-source tool that started it all

      GitHub
      OpenGraph
      Documentation
      Join the Community on Slack

      BloodHound Scentry

      Accelerate your APM practice and reduce identity risk with expert guidance to protect your critical assets.

      Read More
  • Services & Tradecraft
    • OFFENSIVE SERVICES

      Red Team
      Purple Team
      AI Red Team
      Penetration Testing
      Maturity Assessments
      Attack Path Assessment

      TRAINING

      Adversary Tactics

      Red Team Operations
      Identity-Driven Offensive Tradecraft
      Detection
      Tradecraft Analysis

      Adversary Perspectives

      Active Directory
      Azure

      TRAININGS

      SO-CON 2026

      Master in-demand skills with our specialized courses at SO-CON 2026.

      Register Now
  • Solutions
    • SOLUTIONS

      Privileged Access Governance & Compliance
      Eliminate Lateral Movement
      Manage Identity Risk
      Secure Scaling
      Mergers & Acquisitions

      INDUSTRIES

      Public Sector
      Healthcare
      Financial Services

      PARTNERS & INTEGRATIONS

      Partners
      Integrations

      RESOURCES

      Attack Path Management Maturity Model

      Evaluate your ability to stop identity-based attacks

      Read the Whitepaper
  • Community
    • Our Commitment to 
Open Source

      Committed to advancing the community through open source contributions, cutting-edge research, and knowledge sharing

      OPEN SOURCE TOOLS

      BloodHound Community Edition
      Mythic
      Ghostwriter
      Nemesis 2.0
      See All Tools

      Join the Conversation

      Learn from others and share your story on the BloodHoundGang Slack Community

      Connect with us

      OPEN SOURCE RESEARCH

      Ghostwriter illustration

      Collaborative Editing

      Ghostwriter now supports real-time collaborative editing for observation...

      More Info
  • Company
    • ABOUT US

      Why SpecterOps
      News

      GET IN TOUCH

      Careers
      Contact Us

      PRESS RELEASE

      Specter Ops logo on a blue background

      SpecterOps and Tines Partner to Automate Attack Path Management with Native BloodHound Integration

      Learn More

      FEATURED EVENT

      SO-CON 2026

      Conference: April 13-14, 2026
      Training: April 15-18, 2026

      Register
  • Resources
    • RESEARCH

      Case Studies
      White Papers
      Tools
      Datasheets
      Podcasts
      View All

      BLOG

      Research & Tradecraft
      BloodHound
      Industry Insights
      Company Updates
      View All

      EVENTS

      SpecterOps Events
      SO-CON
      Webinars
      Community Events
      Talks
      View All

      BLOG

      Specter Ops logo on a blue background

      Fueling the Fight Against Identity Attacks

      When we founded SpecterOps, one of our core principles was to build a...

      Read article

      RESOURCES

      The Renaissance of NTLM Relay Attacks

      NTLM relay attacks have been around for a long time. While many security...

      Read the Whitepaper
  • Book a Demo
  • Contact Us
    Support
    Blog
  • Book a Demo
  • Platform
    • BloodHound Enterprise

      Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale

      Identity Attack Path Management
      Privilege Zones
      BloodHound Scentry
      Integrations
      Interactive Demo
      APM Maturity Assessment Tool

      BloodHound Community Edition

      Start mapping attack paths with the open-source tool that started it all

      GitHub
      OpenGraph
      Documentation
      Join the Community on Slack

      BloodHound Scentry

      Accelerate your APM practice and reduce identity risk with expert guidance to protect your critical assets.

      Read More
  • Services & Tradecraft
    • OFFENSIVE SERVICES

      Red Team
      Purple Team
      AI Red Team
      Penetration Testing
      Maturity Assessments
      Attack Path Assessment

      TRAINING

      Adversary Tactics

      Red Team Operations
      Identity-Driven Offensive Tradecraft
      Detection
      Tradecraft Analysis

      Adversary Perspectives

      Active Directory
      Azure

      TRAININGS

      SO-CON 2026

      Master in-demand skills with our specialized courses at SO-CON 2026.

      Register Now
  • Solutions
    • SOLUTIONS

      Privileged Access Governance & Compliance
      Eliminate Lateral Movement
      Manage Identity Risk
      Secure Scaling
      Mergers & Acquisitions

      INDUSTRIES

      Public Sector
      Healthcare
      Financial Services

      PARTNERS & INTEGRATIONS

      Partners
      Integrations

      RESOURCES

      Attack Path Management Maturity Model

      Evaluate your ability to stop identity-based attacks

      Read the Whitepaper
  • Community
    • Our Commitment to 
Open Source

      Committed to advancing the community through open source contributions, cutting-edge research, and knowledge sharing

      OPEN SOURCE TOOLS

      BloodHound Community Edition
      Mythic
      Ghostwriter
      Nemesis 2.0
      See All Tools

      Join the Conversation

      Learn from others and share your story on the BloodHoundGang Slack Community

      Connect with us

      OPEN SOURCE RESEARCH

      Ghostwriter illustration

      Collaborative Editing

      Ghostwriter now supports real-time collaborative editing for observation...

      More Info
  • Company
    • ABOUT US

      Why SpecterOps
      News

      GET IN TOUCH

      Careers
      Contact Us

      PRESS RELEASE

      Specter Ops logo on a blue background

      SpecterOps and Tines Partner to Automate Attack Path Management with Native BloodHound Integration

      Learn More

      FEATURED EVENT

      SO-CON 2026

      Conference: April 13-14, 2026
      Training: April 15-18, 2026

      Register
  • Resources
    • RESEARCH

      Case Studies
      White Papers
      Tools
      Datasheets
      Podcasts
      View All

      BLOG

      Research & Tradecraft
      BloodHound
      Industry Insights
      Company Updates
      View All

      EVENTS

      SpecterOps Events
      SO-CON
      Webinars
      Community Events
      Talks
      View All

      BLOG

      Specter Ops logo on a blue background

      Fueling the Fight Against Identity Attacks

      When we founded SpecterOps, one of our core principles was to build a...

      Read article

      RESOURCES

      The Renaissance of NTLM Relay Attacks

      NTLM relay attacks have been around for a long time. While many security...

      Read the Whitepaper
  • Book a Demo
  • Contact Us
    Support
    Blog
  • Book a Demo

Logan Goins

Associate Consultant

Logan Goins is an Associate Consultant at SpecterOps specializing in Adversary Simulation. He is also the author of a variety of offensive identity driven tools including SharpSuccessor, SOAPy, and others.

See the latest by Logan Goins

Wait, Why is my WebClient Started?: SCCM Hierarchy Takeover via NTLM Relay to LDAP

Research & Tradecraft

Wait, Why is my WebClient Started?: SCCM Hierarchy Takeover via NTLM Relay to LDAP

TL;DR – During automatic client push installation, an SCCM site server automatically attempts to map WebDav shares on clients, starting…

By: Logan Goins

15 mins

The (Near) Return of the King: Account Takeover Using the BadSuccessor Technique

Research & Tradecraft

The (Near) Return of the King: Account Takeover Using the BadSuccessor Technique

TL;DR – After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning…

By: Logan Goins

13 mins

Operating Outside the Box: NTLM Relaying Low-Privilege HTTP Auth to LDAP

Research & Tradecraft

Operating Outside the Box: NTLM Relaying Low-Privilege HTTP Auth to LDAP

TL;DR When operating out of a ceded access or phishing payload with no credential material, you can use low-privilege HTTP…

By: Logan Goins

13 mins

Make Sure to Use SOAP(y) – An Operators Guide to Stealthy AD Collection Using ADWS

Research & Tradecraft

Make Sure to Use SOAP(y) – An Operators Guide to Stealthy AD Collection Using ADWS

Learn how to perform stealthy recon of Active Directory environments over ADWS for Red Team Assessments

By: Logan Goins

17 mins

SpecterOps

Platform

BloodHound Enterprise
BloodHound Community Edition

Services and Tradecraft

Offensive Services

TRAINING

Red Team Operations
Identity-Driven Offensive Tradecraft
Detection
Tradecraft Analysis
Active Directory
Azure

Solutions

SOLUTIONS

Privileged Access Governance and Compliance
Eliminate Lateral Movement
Manage Identity Risk
Secure Scaling
Mergers & Acquisitions

INDUSTRIES

Public Sector
Healthcare
Financial Services

PARTNERS & INTEGRATIONS

Partners
Integrations

Resources

Research
Blog
Events
Podcasts
Open Source Tools

Company

Why SpecterOps
News
Careers
Contact

Copyright 2026 Specter Ops, Inc. All Rights Reserved.

Terms of Service
|
Privacy Policy
|
Trust Center