blog category

BloodHound

image for Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

BloodHound

Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

In conversation: Pete McKernan & Luke Luckett As organizations seek to wrap their arms around potential cybersecurity...

Oct 2, 2024 • 6 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 3

BloodHound

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated...

Sep 11, 2024 • 22 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 3

BloodHound

ADCS Attack Paths in BloodHound — Part 3

Sep 11, 2024 • 22 min read
Read Post
image for BloodHound Operator — Dog Whispering Reloaded

BloodHound

BloodHound Operator — Dog Whispering Reloaded

BloodHound Operator — Dog Whispering Reloaded It’s summer 2024 and we are back! Actually, we are SO back,...

Aug 6, 2024 • 20 min read
Read Post
image for Hybrid Attack Paths, New Views and your favorite dog learns an old trick

BloodHound

Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Introducing Hybrid Attack Paths Death from Above: An Attack Path from Azure to Active Directory With BloodHound...

Aug 2, 2024 • 6 min read
Read Post
image for Mapping Snowflake’s Access Landscape

BloodHound

Mapping Snowflake’s Access Landscape

Attack Path Management Because Every Snowflake (Graph) is Unique Introduction On June 2nd, 2024, Snowflake released a...

Jun 13, 2024 • 28 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 2

BloodHound

ADCS Attack Paths in BloodHound — Part 2

ADCS Attack Paths in BloodHound — Part 2 In Part 1 of this series, we explained how we incorporated...

May 1, 2024 • 13 min read
Read Post
image for Final Steps to BloodHound Enterprise for Government — FedRAMP High Compliance

BloodHound

Final Steps to BloodHound Enterprise for Government — FedRAMP High Compliance

Final Steps to BloodHound Federal — FedRAMP High Compliance Ever since SpecterOps first launched BloodHound Enterprise (BHE) in...

Mar 5, 2024 • 3 min read
Read Post
image for ADCS ESC14 Abuse Technique

BloodHound

ADCS ESC14 Abuse Technique

The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate...

Feb 28, 2024 • 38 min read
Read Post