blog category
BloodHound
BloodHound
ADCS Attack Paths in BloodHound — Part 2
ADCS Attack Paths in BloodHound — Part 2 In Part 1 of this series, we explained how we incorporated...
By: Jonas Bülow Knudsen
May 1, 2024 • 13 min read
Read Post
BloodHound
Final Steps to BloodHound Enterprise for Government— FedRAMP High Compliance
Final Steps to BloodHound Enterprise for Government— FedRAMP High Compliance Ever since SpecterOps first launched BloodHound Enterprise...
By: Justin Kohler
Mar 5, 2024 • 3 min read
Read Post
BloodHound
The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate...
By: Jonas Bülow Knudsen
Feb 28, 2024 • 38 min read
Read Post
BloodHound
It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance...
By: Jonas Bülow Knudsen
Feb 14, 2024 • 15 min read
Read Post
BloodHound
Microsoft Breach — How Can I See This In BloodHound?
Microsoft Breach — How Can I See This In BloodHound? Summary On January 25, 2024, Microsoft announced Russia’s...
By: Stephen Hinck
Feb 2, 2024 • 7 min read
Read Post
BloodHound
Background If you’ve found yourself on a red team assessment without SharpHound (maybe due to OPSEC...
By: Matt Creel
Jan 30, 2024 • 13 min read
Read Post
BloodHound
ADCS Attack Paths in BloodHound — Part 1
ADCS Attack Paths in BloodHound — Part 1 Since Will Schroeder and Lee Christensen published the Certified Pre-Owned whitepaper,...
By: Jonas Bülow Knudsen
Jan 24, 2024 • 16 min read
Read Post
BloodHound
Cypher Queries in BloodHound Enterprise
BloodHound Enterprise (BHE) recently saw the addition of a new, game-changing feature: open-ended Cypher searches. For...
By: Nathan Davis
Jan 10, 2024 • 11 min read
Read Post
BloodHound
BloodHound Enterprise: Securing Active Directory Using Graph Theory
BloodHound Enterprise: Securing Active Directory Using Graphs Prior to my employment at SpecterOps, I hadn’t worked...