blog category

BloodHound

image for Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

BloodHound

Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

In conversation: Pete McKernan & Luke Luckett As organizations seek to wrap their arms around potential cybersecurity...

By: Luke Luckett
Oct 2, 2024 • 6 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 3

BloodHound

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated...

By: Jonas Bülow Knudsen
Sep 11, 2024 • 22 min read
Read Post
image for BloodHound Operator — Dog Whispering Reloaded

BloodHound

BloodHound Operator — Dog Whispering Reloaded

BloodHound Operator — Dog Whispering Reloaded It’s summer 2024 and we are back! Actually, we are SO back,...

By: sadprocessor
Aug 6, 2024 • 20 min read
Read Post
image for Hybrid Attack Paths, New Views and your favorite dog learns an old trick

BloodHound

Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Introducing Hybrid Attack Paths Death from Above: An Attack Path from Azure to Active Directory With BloodHound...

By: Justin Kohler
Aug 2, 2024 • 6 min read
Read Post
image for Mapping Snowflake’s Access Landscape

BloodHound

Mapping Snowflake’s Access Landscape

Attack Path Management Because Every Snowflake (Graph) is Unique Introduction On June 2nd, 2024, Snowflake released a...

By: Jared Atkinson
Jun 13, 2024 • 28 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 2

BloodHound

ADCS Attack Paths in BloodHound — Part 2

ADCS Attack Paths in BloodHound — Part 2 In Part 1 of this series, we explained how we incorporated...

By: Jonas Bülow Knudsen
May 1, 2024 • 13 min read
Read Post
image for Final Steps to BloodHound Enterprise for Government— FedRAMP High Compliance

BloodHound

Final Steps to BloodHound Enterprise for Government— FedRAMP High Compliance

Final Steps to BloodHound Enterprise for Government— FedRAMP High Compliance Ever since SpecterOps first launched BloodHound Enterprise...

By: Justin Kohler
Mar 5, 2024 • 3 min read
Read Post
image for ADCS ESC14 Abuse Technique

BloodHound

ADCS ESC14 Abuse Technique

The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate...

By: Jonas Bülow Knudsen
Feb 28, 2024 • 38 min read
Read Post
image for ADCS ESC13 Abuse Technique

BloodHound

ADCS ESC13 Abuse Technique

It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance...

By: Jonas Bülow Knudsen
Feb 14, 2024 • 15 min read
Read Post