Tag

BloodHound

Mapping Deception Solutions With BloodHound OpenGraph  – Configuration Manager

BloodHound

Mapping Deception Solutions With BloodHound OpenGraph  – Configuration Manager

TL;DR: At SpecterOps, we look at Attack Path Management from multiple perspectives, including those of identifying...

Feb 19, 2026
Read Post
Updates to the MSSQLHound OpenGraph Collector for BloodHound

BloodHound

Updates to the MSSQLHound OpenGraph Collector for BloodHound

tl;dr: MSSQLHound, a PowerShell script that collects security information from remote MSSQL Server instances, now scans...

Jan 20, 2026
Read Post
MSSQL and SCCM Elevation of Privilege Vulnerabilities

BloodHound

MSSQL and SCCM Elevation of Privilege Vulnerabilities

TL;DR: I found two privilege escalation vulnerabilities, one in MSSQL (CVE-2025-49758) and one in Microsoft Configuration...

Jan 15, 2026
Read Post
Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM

BloodHound

Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM

tl;dr: Security researchers have discovered 30+ unique attack techniques targeting SCCM in the past several years,...

Jan 13, 2026
Read Post
Azure Seamless SSO: When Cookie Theft Doesn’t Cut It

BloodHound

Azure Seamless SSO: When Cookie Theft Doesn’t Cut It

TL;DR The cookie crumbled when it expired, but the attack path didn’t. Learn how BloodHound graph...

Dec 11, 2025
Read Post
Taming the Attack Graph: A Many Subgraphs Approach to Attack Path Analysis

BloodHound

Taming the Attack Graph: A Many Subgraphs Approach to Attack Path Analysis

TL;DR This blog presents a framework using technology subgraphs, decomposition, and graph abstraction to model hybrid...

Nov 13, 2025
Read Post
AdminSDHolder: Misconceptions, Misconfigurations, and Myths

BloodHound

AdminSDHolder: Misconceptions, Misconfigurations, and Myths

TL;DR: This blog is the brief version. I love delving into ancient history. The Fall of...

Oct 31, 2025
Read Post
PingOne Attack Paths

BloodHound

PingOne Attack Paths

TL;DR: You can use PingOneHound in conjunction with BloodHound Community Edition to discover, analyze, execute, and...

Oct 20, 2025
Read Post
The Clean Source Principle and the Future of Identity Security

BloodHound

The Clean Source Principle and the Future of Identity Security

TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no...

Oct 8, 2025
Read Post