Trending
Martin Sohn Christensen's Avatar

Martin Sohn Christensen

@martinsohn.dk

Security Researcher @ SpecterOps https://martinsohn.dk

92
Followers
60
Following
21
Posts
05.10.2023
Joined
Posts Following

Latest posts by Martin Sohn Christensen @martinsohn.dk

The #SOCON2026 agenda is live! ๐ŸŽ‰

Explore talks, topics, & speakers across the Tradecraft, OpenGraph, & new Practice Track, focused on turning Attack Path Management into an operational discipline.

Check out the agenda & plan your experience: ghst.ly/socon26-tw

๐Ÿงต: 1/4

27.01.2026 22:35 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
BloodHound Operator: The Six Degrees Of Master Yoda - SpecterOps A Technical Dive Into BloodHound OpenGraph With BloodHound Operator & Master Yodaโ€ฆ TL;DR: The latest version of BloodHound introduces BloodHound OpenGraph. This new feature allows for ingestion of any...

If you found the above cool, then check out @sadprocessor.bsky.social's much more comprehensive OpenGraph ร— Star Wars demo.
specterops.io/blog/2025/09...

19.09.2025 19:07 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

BloodHound's OpenGraph is ๐Ÿ”ฅ๐Ÿš€
This is how we rapidly developed a customer specific attack primitive for BloodHound that we call "ManagerOf" ๐Ÿ‘‡

19.09.2025 19:05 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound - SpecterOps The ability of an attacker controlling one domain to compromise another through an Active Directory (AD) trust depends on the trust type and configuration. To better map these relationships and make i...

I publish two blog posts today! ๐Ÿ“๐Ÿซ

First dives into how we're improving the way BloodHound models attack paths through AD trusts: specterops.io/blog/2025/06...

Second covers an attack technique I came across while exploring AD trust abuse: specterops.io/blog/2025/06...

Hope you enjoy the read ๐Ÿฅณ

25.06.2025 10:14 ๐Ÿ‘ 18 ๐Ÿ” 11 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1

Easily find and share BloodHound Cyphers on queries.specterops.io
Released with ~90 new Cypher queries, go check them out!

@joeydreijer.bsky.social and I spent many hours creating it and we hope you find it useful. All feedback is appreciated :)

17.06.2025 19:57 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Cool! Is there a way to enum Symantec assets via LPDAP? E.g. does the server/service acc have a specific SPN?

16.06.2025 08:41 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Understanding & Mitigating BadSuccessor - SpecterOps Understanding the impact of the BadSuccessor AD attack primitive and mitigating the abuse via targeted Deny ACEs on Organizational Units.

The blog post: specterops.io/blog/2025/05...

03.06.2025 10:06 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

**Every** BloodHound Enterprise tenant I've checked has multiple Non Tier Zero principals with the rights required for BadSuccessor. Luckily a 2025 DC is still rare.
Often helpdesk has GenericAll, misconfig'ed to apply on the OU itself, instead of only inheriting to principals within.

24.05.2025 05:01 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Shout out (skud ud) to @embar.io
Best CTF DJ. #tdcnetctf

26.04.2025 16:01 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

BloodHound has 4 new edges: ๐—–๐—ผ๐—ฒ๐—ฟ๐—ฐ๐—ฒ๐—”๐—ป๐—ฑ๐—ฅ๐—ฒ๐—น๐—ฎ๐˜†๐—ก๐—ง๐—Ÿ๐— ๐—ง๐—ผ๐—ฆ๐— ๐—•, ...๐—ง๐—ผ๐—Ÿ๐——๐—”๐—ฃ, ...๐—ง๐—ผ๐—Ÿ๐——๐—”๐—ฃ๐—ฆ, ...๐—ง๐—ผ๐—”๐——๐—–๐—ฆ [ESC8]

They combine ๐—ฐ๐—ผ๐—ฒ๐—ฟ๐—ฐ๐—ถ๐—ผ๐—ป and ๐—ฟ๐—ฒ๐—น๐—ฎ๐˜†๐—ถ๐—ป๐—ด, allowing Auth. Users to compromise computers. Read this excellent post by Elad Shamir if you are unfamiliar with those terms or want to know how to mitigate.

09.04.2025 06:46 ๐Ÿ‘ 4 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image Post image

I had a great time at @specterops.bsky.social #SOCON2025 in Arlington/DC!

I'm grateful I get to meet all you awesome people; community members and Specters. Huge thanks to the many speakers and trainers ๐Ÿ’™

See you next year!

08.04.2025 13:17 ๐Ÿ‘ 7 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Butthole*... Excellent typo

07.02.2025 10:58 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image
07.02.2025 10:08 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Intune Attack Pathsโ€Šโ€”โ€ŠPart 1 Intune is an attractive system for adversaries to targetโ€ฆ

In Part 1 of my Intune Attack Paths series, I discuss the fundamental components and mechanics of Intune that lead to the emergence of attack paths: posts.specterops.io/intune-attac...

15.01.2025 17:33 ๐Ÿ‘ 42 ๐Ÿ” 19 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Screenshot of trending topics launched on Christmas 2025. Topics trending include: Virat Kohli, Red Panda, Porzingis, Post Malone, Beyoncรฉ, Gavin and Stacey Finale, Sixers, A Complete Unknown, King Henry, Joel Embiid, Pentatonix

Screenshot of trending topics launched on Christmas 2025. Topics trending include: Virat Kohli, Red Panda, Porzingis, Post Malone, Beyoncรฉ, Gavin and Stacey Finale, Sixers, A Complete Unknown, King Henry, Joel Embiid, Pentatonix

Merry Christmas from us to you ๐ŸŽ„๐ŸŽ๐Ÿ’™ We launched Trending Topics today, and you can find it by tapping the search icon on the bottom bar of the app or the right sidebar on desktop.

26.12.2024 01:09 ๐Ÿ‘ 46809 ๐Ÿ” 5278 ๐Ÿ’ฌ 1521 ๐Ÿ“Œ 972
Preview
Misconfiguration Manager: Detection Updates TL;DR: The Misconfiguration Manager DETECT section has been updated with relevant guidance to help defensive operators identify the mostโ€ฆ

The Misconfiguration Manager DETECT section has been updated with fresh guidance to help defensive operators spot the most prolific attack techniques.

Check out the blog post from @bouj33boy.bsky.social to learn more. ghst.ly/3VJ5y4F

16.12.2024 16:08 ๐Ÿ‘ 6 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
a woman wearing glasses says please with her hand up ALT: a woman wearing glasses says please with her hand up

It's that time of year again everybody! I want to know YOUR thoughts on Mythic! What did you like? What could be improved? What would you like to see next? Why do you or don't you use it? If you could change something, what would it be? www.surveymonkey.com/r/MythicPlan... I'm all ears :)

25.11.2024 17:35 ๐Ÿ‘ 10 ๐Ÿ” 5 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 2

Other than securing DNS, what could prevent this technique?
Require SMB client signing? Some Kerberos hardening setting? Or only tiering (eg. Auth. Policy Silo)?

25.11.2024 20:33 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

25.11.2024 17:31 ๐Ÿ‘ 63 ๐Ÿ” 43 ๐Ÿ’ฌ 3 ๐Ÿ“Œ 0
Preview
ShadowHound: A SharpHound Alternative Using Native PowerShell ShadowHound is a PowerShell tool designed for mapping Active Directory environments without using known malicious binaries. It utilizes legitimate PowerShell modules for data collection through twoโ€ฆ

ShadowHound - brand new .ps1 SharpHound alternative that supports LDAP and ADWS
Outputs data in ldapsearch format that can be converted to BH JSON with BOFHound.
blog.fndsec.net/2024/11/25/s...

25.11.2024 12:51 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Meme template "they don't know".
*infosec bsky users*
me: they don't know that I had 395 followers on X

Meme template "they don't know". *infosec bsky users* me: they don't know that I had 395 followers on X

355 to go!

21.11.2024 21:05 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Relaying Kerberos over SMB using krbrelayx

Awesome new addition to krbrelayx by Hugow from Synacktiv: www.synacktiv.com/publications...

20.11.2024 16:02 ๐Ÿ‘ 29 ๐Ÿ” 14 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
DEATHcon 2024: Prevention Engineering via the RPC and LDAP Firewalls
DEATHcon 2024: Prevention Engineering via the RPC and LDAP Firewalls YouTube video by Zero Networks

RCP Firewall and LDAP Firewall workshop by Sagie Dulce and Dekel Paz.

youtube.com/watch?v=hJyI...

19.11.2024 17:30 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Windows ships with insecure defaults for network shares, granting Read access to Everyone. But you can change that with "SrvsvcDefaultShareInfo" in the registry.
I made a post about it: blog.improsec.com/tech-blog/ne...

15.11.2024 08:49 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0 Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.

PowerHuntShares is a useful tool by Scott Sutherland (_nullbind), and the v2 looks amazing. I gotta test the experimental "Share Graph".
www.netspi.com/blog/technic...

15.11.2024 08:45 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

SO-CON CFP submitted! Get yours in before tomorrow's deadline.
specterops.io/so-con/

14.11.2024 14:21 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Tier list of AD tiers

13.11.2024 11:11 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Welcome! You are invited to join a webinar: Defining the Undefined: What is Tier Zero, Part 4. After registering, you will receive a confirmation email about joining the webinar. In this webinar we continue to define Tier Zero with another deep dive into the intricate world of critical identities and resources across Active Directory and Azure. This discussion covers: - Insig...

Join our webinar on Thurs when Jonas Knudsen, Lee Christensen, and I will present pt. 4 of "What Is Tier Zero", covering:
- MS Exchange On-Premises
- ADCS
- Insights from isolating Tier Zero with BloodHound Enterprise customers

Watch live or register for on-demand at ghst.ly/4eSssxL

11.11.2024 13:56 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

>an explicit Deny overrules an explicit Allow.

If Deny is closer to the secureable object than the Allow, ie. explicit Allow takes precedence over inherited Deny, and parent inherited Allow > grandparent Deny.

08.11.2024 08:33 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0