SpecterOps's Avatar

SpecterOps

@specterops.io

Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management

1,135
Followers
64
Following
492
Posts
12.11.2024
Joined
Posts Following

Latest posts by SpecterOps @specterops.io

Want to write your own Nemesis enrichment modules? ✍️

@harmj0y.bsky.social & @tifkin.bsky.social's latest blog post covers module dev, Yara/Titus rule updates, and C2 connector design, including the new Claude Code/OpenAI Codex "easy mode."

Read more: https://ghst.ly/4kYDbLh

10.03.2026 18:07 👍 1 🔁 0 💬 0 📌 0
Post image

The countdown to #RSAC is on ⏳

We’ll be in San Francisco talking all things Identity Attack Path Management. Stop by booth N-6277 for live BloodHound demos and see how teams are eliminating identity-based attack paths.

Schedule time w/ our execs ➡️ https://ghst.ly/4rl96XO

09.03.2026 21:49 👍 0 🔁 0 💬 0 📌 0
Video thumbnail

New #BloodHoundBasics post on edge filtering from Carlo Alcantara!

DYK: You can filter edges in BloodHound to simulate remediating attack paths? Simply use the filter to remove an edge to reveal the next shortest path. In this example, we keep filtering until no path remains.

06.03.2026 19:10 👍 1 🔁 1 💬 0 📌 0

Chrome 137+ added a CNG wrinkle to App-Bound Encryption.

@harmj0y.bsky.social & @tifkin.bsky.social share how Nemesis 2.2 handles it, automating DPAPI decryption from SYSTEM & user masterkeys through Chromekey1 to cookie/login recovery, w/ retroactive artifact linking. https://ghst.ly/3OzfkFN

04.03.2026 18:08 👍 0 🔁 2 💬 0 📌 0
Post image

Happy #BloodHoundBasics Friday from @jonas-bk.bsky.social!

Auditing group nesting is painful - until you use BloodHound 🐶

The graph makes it simple to explore group members, including nested groups.

You can use this built-in cypher query for Tier Zero groups in AD.

27.02.2026 20:46 👍 2 🔁 0 💬 0 📌 0
Preview
Nemesis 2.2 - SpecterOps Nemesis 2.2 introduces large disk image processing, LLM agents for automated finding triage and credential analysis, full Chromium DPAPI decryption support, host reporting, and significant performance...

If a host is compromised, what risk does that data represent?

Nemesis 2.2 helps answer that.

✅ Large container processing
✅ Host-based reporting
✅ AI-assisted triage
✅ Full Chromium DPAPI handling

Read @harmj0y.bsky.social + @tifkin.bsky.social's latest blog post: https://ghst.ly/4l2DDbl

25.02.2026 18:14 👍 2 🔁 1 💬 0 📌 0
Video thumbnail

Missed the BloodHound Scentry launch webinar w/ Robby Winchester & @subat0mik.bsky.social?

Watch on demand to learn how this new service helps organizations accelerate their APM programs and reduce identity risk.

➡️ https://ghst.ly/4ruLjWh

24.02.2026 23:49 👍 0 🔁 0 💬 0 📌 0
Post image

#DYK we recently launched a new subreddit? Be part of the conversation at r/SpecterOpsCommunity!

Join us this Friday for our kickoff #RedditAMA featuring TaskHound developer Robin Unglaub who will be taking your questions on the tool.

Drop your Qs here ➡️ https://ghst.ly/4ryInrD

24.02.2026 14:50 👍 1 🔁 0 💬 0 📌 0
Post image

BloodHound maps attack paths. But what if you graphed incident data too? 📈

At #SOCON2026, @olafhartong.nl explores enriched incident graphs in Kusto, combining BloodHound with telemetry to reveal powerful correlations.

Learn more & register ➡️ https://ghst.ly/socon26-bsky

23.02.2026 18:43 👍 1 🔁 1 💬 0 📌 0
Post image Post image

It’s #BloodHoundBasics day w/ @scoubi.bsky.social!

This week: Relationship Shortcuts.

Instead of listing all traversable relationships in your Cypher queries, use:

[:AD_ATTACK_PATHS] for Active Directory
[:AZ_ATTACK_PATHS] for Entra ID
[:ALL_ATTACK_PATHS] for AD & Entra

20.02.2026 20:10 👍 5 🔁 1 💬 0 📌 0
Post image

Attack paths don’t reduce themselves.

Join Robby Winchester & @subat0mik.bsky.social TOMORROW as they introduce BloodHound Scentry—expert-led Attack Path Management designed to help teams move from visibility to continuous risk reduction.

Register ➡️ ghst.ly/4tJ4k94

18.02.2026 19:19 👍 1 🔁 0 💬 0 📌 0
Preview
STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline - SpecterOps Analyze Entra ID Conditional Access policies offline. CAPSlock simulates sign-ins and exposes enforcement gaps without generating tenant activity.

Every Entra ID assessment ends here: “How do I get a token without triggering Conditional Access controls?” 🤔

Lee Robinson built CAPSlock, an offline ROADrecon-based Conditional Access engine that simulates sign-ins & flags gaps without touching the tenant. ghst.ly/4aHUGuD

17.02.2026 20:14 👍 6 🔁 2 💬 0 📌 0
Post image

The ZIP contains all queries, ready for import to BloodHound.
1️⃣ Download queries(.)zip from Releases on GitHub: ghst.ly/3OmZQEH
2️⃣ In BloodHound: Explore → Cypher → Import OR via API: POST to /api/v2/saved-queries/import
3️⃣ Done! All queries instantly available.

🧵: 3/3

13.02.2026 19:41 👍 0 🔁 1 💬 0 📌 0

The BloodHound Query Library currently has 199 Cypher queries for security work in the BloodHound graph.
It's all open source and community-maintained.

Front end: queries.specterops.io
GitHub: ghst.ly/4rKjTeI

🧵: 2/3

13.02.2026 19:41 👍 1 🔁 1 💬 1 📌 0
Post image

Happy #BloodHoundBasics Friday w/ @martinsohn.dk!
Did you know the BloodHound Query Library now includes a ZIP of all queries in Releases on GitHub for bulk importing?

No more copying queries one by one—grab & import the whole collection in seconds!

🧵: 1/3

13.02.2026 19:41 👍 1 🔁 0 💬 1 📌 0
Post image

This is your sign to save your spot in our Detection course at #SOCON2026!

Learn how to identify adversaries using TTPs, uncover telemetry gaps, and build alerts that survive real-world evasion.

Attend in person & get a free conf. pass 👉 ghst.ly/socon26-regbsky

13.02.2026 14:46 👍 1 🔁 0 💬 0 📌 0
Post image

Building an Attack Path Management program is hard. Sustaining one is harder.

Join Robby Winchester & @subat0mik.bsky.social as they introduce BloodHound Scentry, an advisory service to scale APM visibility, remediation & protection across Security, Identity & IT.

➡️ ghst.ly/4tJ4k94

11.02.2026 19:09 👍 0 🔁 0 💬 0 📌 0
Post image

Introducing BloodHound Scentry: BloodHound Enterprise + SpecterOps experts working alongside your team to eliminate attack paths and accelerate APM.

Level 0 → Level 3 maturity in ~6 months. Not theory. Tradecraft. 🎯

Learn more ➡️ ghst.ly/bhscentry-bsky

10.02.2026 15:01 👍 1 🔁 0 💬 0 📌 0
Post image

Happy #BloodHoundBasics from @andyrobbins.bsky.social!

Want to see attack paths in your own environment? Install BloodHound CE with three commands:

1️⃣ wget ghst.ly/3NTWRmY
2️⃣ tar -xvzf bloodhound-cli-linux-amd64.tar.gz
3️⃣ ./bloodhound-cli install

More info here: ghst.ly/3NMjhqn

30.01.2026 22:58 👍 4 🔁 1 💬 0 📌 0

Design goals:

✅ No Azure mgmt APIs from agents
✅ Per-agent containers (agent-*)
✅ Container-scoped SAS tokens

Read more: ghst.ly/4bLIGKT

30.01.2026 18:33 👍 1 🔁 0 💬 0 📌 0
Post image

New from Andrew Gomez + Allen DeMoura: azureBlob, a Mythic C2 profile that uses Azure Blob Storage as transport.Supported Agents:

🐍 Medusa
🪽 Pegasus (new test agent)
❤️ Your fav agent (with simple integration guide)

ghst.ly/4bLIGKT

30.01.2026 18:33 👍 2 🔁 1 💬 1 📌 0
Post image

Identity security in restricted environments shouldn’t be limited to periodic reviews.

BloodHound Enterprise on-premises enables continuous Identity Attack Path Management without cloud connectivity.

Learn more ➡️ ghst.ly/4kadAi0

29.01.2026 17:11 👍 5 🔁 3 💬 0 📌 0
Post image

The new Practice Track puts Attack Path Management into action with proven frameworks and real-world case studies. Plus, participate in a hands-on BloodHound Quest lab designed to turn identity risk into measurable outcomes.

🧵: 4/4

27.01.2026 22:35 👍 1 🔁 0 💬 0 📌 0
Post image

The OpenGraph Track advances Attack Path Management through deep research on identity graphs, hybrid attack paths, and emerging threats.

From hybrid and federated environments to AI & non-human identities, this track pushes the boundaries of identity security research.

🧵: 3/4

27.01.2026 22:35 👍 1 🔁 0 💬 1 📌 0
Post image

The Tradecraft Track dives into breaking and detecting real adversary behavior through cutting-edge offensive and defensive tradecraft.

Learn how real attackers abuse identity, how those paths evolve, and how defenders can detect and disrupt them in practice.

🧵: 2/4

27.01.2026 22:35 👍 2 🔁 0 💬 1 📌 0

The #SOCON2026 agenda is live! 🎉

Explore talks, topics, & speakers across the Tradecraft, OpenGraph, & new Practice Track, focused on turning Attack Path Management into an operational discipline.

Check out the agenda & plan your experience: ghst.ly/socon26-tw

🧵: 1/4

27.01.2026 22:35 👍 3 🔁 2 💬 1 📌 0

You can enable this functionality in your tenant by going to Administration > BloodHound Configuration > Citrix RDP Support.

🧵: 4/4

23.01.2026 21:01 👍 0 🔁 0 💬 0 📌 0

So when BHE sees that group, it understands Citrix is in control of access. It understands RDP would not lead to interactive desktop compromise and it removes misleading CanRDP edges that would otherwise overstate risk.

🧵: 3/4

23.01.2026 21:01 👍 0 🔁 0 💬 1 📌 0

The Citrix "Direct Access Users" group exists specifically to prevent users from RDPing directly into the VDA’s Windows session unless they’re explicitly allowed. The Citrix "Direct Access Users" group is a deny-by-default control.

🧵: 2/4

23.01.2026 21:01 👍 0 🔁 0 💬 1 📌 0
Post image

A very happy #BloodHoundBasics day from @psionicjake.github.io!

In BloodHound Enterprise, CanRDP normally means:
"If I compromise this user, I can RDP directly to this machine and land inside Windows."

But Citrix changes what "RDP access" actually means.

🧵: 1/4

23.01.2026 21:01 👍 4 🔁 0 💬 1 📌 0