blog category

BloodHound

image for Updates to the MSSQLHound OpenGraph Collector for BloodHound

BloodHound

Updates to the MSSQLHound OpenGraph Collector for BloodHound

tl;dr: MSSQLHound, a PowerShell script that collects security information from remote MSSQL Server instances, now scans...

By: Chris Thompson
Jan 20, 2026 • 7 min read
Read Post
image for MSSQL and SCCM Elevation of Privilege Vulnerabilities

BloodHound

MSSQL and SCCM Elevation of Privilege Vulnerabilities

TL;DR: I found two privilege escalation vulnerabilities, one in MSSQL (CVE-2025-49758) and one in Microsoft Configuration...

By: Chris Thompson
Jan 15, 2026 • 16 min read
Read Post
image for Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM

BloodHound

Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM

tl;dr: Security researchers have discovered 30+ unique attack techniques targeting SCCM in the past several years,...

By: Chris Thompson
Jan 13, 2026 • 45 min read
Read Post
image for Mapping Deception with BloodHound OpenGraph

BloodHound

Mapping Deception with BloodHound OpenGraph

TL;DR As defensive postures continue to mature, deception technologies provide organizations the opportunity to harden defenses...

By: Ben Schroeder
Dec 23, 2025 • 27 min read
Read Post
image for Azure Seamless SSO: When Cookie Theft Doesn’t Cut It

BloodHound

Azure Seamless SSO: When Cookie Theft Doesn’t Cut It

TL;DR The cookie crumbled when it expired, but the attack path didn’t. Learn how BloodHound graph...

By: Andrew Gomez
Dec 11, 2025 • 17 min read
Read Post
image for Operationalizing BloodHound Enterprise: Security automation with Tines

BloodHound

Operationalizing BloodHound Enterprise: Security automation with Tines

TL;DR This blog demonstrates how to operationalize BloodHound Enterprise by using Tines to quickly assess the...

By: Hugo van den Toorn, Joey Dreijer
Dec 9, 2025 • 8 min read
Read Post
image for Taming the Attack Graph: A Many Subgraphs Approach to Attack Path Analysis

BloodHound

Taming the Attack Graph: A Many Subgraphs Approach to Attack Path Analysis

TL;DR This blog presents a framework using technology subgraphs, decomposition, and graph abstraction to model hybrid...

By: JD Crandell
Nov 13, 2025 • 8 min read
Read Post
image for PingOne Attack Paths

BloodHound

PingOne Attack Paths

TL;DR: You can use PingOneHound in conjunction with BloodHound Community Edition to discover, analyze, execute, and...

By: Andy Robbins
Oct 20, 2025 • 14 min read
Read Post
image for The Clean Source Principle and the Future of Identity Security

BloodHound

The Clean Source Principle and the Future of Identity Security

TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no...

By: Jared Atkinson
Oct 8, 2025 • 13 min read
Read Post