SpecterOps's Avatar

SpecterOps

@specterops.io

Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management

1,134
Followers
64
Following
490
Posts
12.11.2024
Joined
Posts Following

Latest posts by SpecterOps @specterops.io

Video thumbnail

New #BloodHoundBasics post on edge filtering from Carlo Alcantara!

DYK: You can filter edges in BloodHound to simulate remediating attack paths? Simply use the filter to remove an edge to reveal the next shortest path. In this example, we keep filtering until no path remains.

06.03.2026 19:10 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Chrome 137+ added a CNG wrinkle to App-Bound Encryption.

@harmj0y.bsky.social & @tifkin.bsky.social share how Nemesis 2.2 handles it, automating DPAPI decryption from SYSTEM & user masterkeys through Chromekey1 to cookie/login recovery, w/ retroactive artifact linking. https://ghst.ly/3OzfkFN

04.03.2026 18:08 πŸ‘ 0 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Happy #BloodHoundBasics Friday from @jonas-bk.bsky.social!

Auditing group nesting is painful - until you use BloodHound 🐢

The graph makes it simple to explore group members, including nested groups.

You can use this built-in cypher query for Tier Zero groups in AD.

27.02.2026 20:46 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Nemesis 2.2 - SpecterOps Nemesis 2.2 introduces large disk image processing, LLM agents for automated finding triage and credential analysis, full Chromium DPAPI decryption support, host reporting, and significant performance...

If a host is compromised, what risk does that data represent?

Nemesis 2.2 helps answer that.

βœ… Large container processing
βœ… Host-based reporting
βœ… AI-assisted triage
βœ… Full Chromium DPAPI handling

Read @harmj0y.bsky.social + @tifkin.bsky.social's latest blog post: https://ghst.ly/4l2DDbl

25.02.2026 18:14 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Missed the BloodHound Scentry launch webinar w/ Robby Winchester & @subat0mik.bsky.social?

Watch on demand to learn how this new service helps organizations accelerate their APM programs and reduce identity risk.

➑️ https://ghst.ly/4ruLjWh

24.02.2026 23:49 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

#DYK we recently launched a new subreddit? Be part of the conversation at r/SpecterOpsCommunity!

Join us this Friday for our kickoff #RedditAMA featuring TaskHound developer Robin Unglaub who will be taking your questions on the tool.

Drop your Qs here ➑️ https://ghst.ly/4ryInrD

24.02.2026 14:50 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

BloodHound maps attack paths. But what if you graphed incident data too? πŸ“ˆ

At #SOCON2026, @olafhartong.nl explores enriched incident graphs in Kusto, combining BloodHound with telemetry to reveal powerful correlations.

Learn more & register ➑️ https://ghst.ly/socon26-bsky

23.02.2026 18:43 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

It’s #BloodHoundBasics day w/ @scoubi.bsky.social!

This week: Relationship Shortcuts.

Instead of listing all traversable relationships in your Cypher queries, use:

[:AD_ATTACK_PATHS] for Active Directory
[:AZ_ATTACK_PATHS] for Entra ID
[:ALL_ATTACK_PATHS] for AD & Entra

20.02.2026 20:10 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Attack paths don’t reduce themselves.

Join Robby Winchester & @subat0mik.bsky.social TOMORROW as they introduce BloodHound Scentryβ€”expert-led Attack Path Management designed to help teams move from visibility to continuous risk reduction.

Register ➑️ ghst.ly/4tJ4k94

18.02.2026 19:19 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline - SpecterOps Analyze Entra ID Conditional Access policies offline. CAPSlock simulates sign-ins and exposes enforcement gaps without generating tenant activity.

Every Entra ID assessment ends here: β€œHow do I get a token without triggering Conditional Access controls?” πŸ€”

Lee Robinson built CAPSlock, an offline ROADrecon-based Conditional Access engine that simulates sign-ins & flags gaps without touching the tenant. ghst.ly/4aHUGuD

17.02.2026 20:14 πŸ‘ 6 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

The ZIP contains all queries, ready for import to BloodHound.
1️⃣ Download queries(.)zip from Releases on GitHub: ghst.ly/3OmZQEH
2️⃣ In BloodHound: Explore β†’ Cypher β†’ Import OR via API: POST to /api/v2/saved-queries/import
3️⃣ Done! All queries instantly available.

🧡: 3/3

13.02.2026 19:41 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

The BloodHound Query Library currently has 199 Cypher queries for security work in the BloodHound graph.
It's all open source and community-maintained.

Front end: queries.specterops.io
GitHub: ghst.ly/4rKjTeI

🧡: 2/3

13.02.2026 19:41 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Post image

Happy #BloodHoundBasics Friday w/ @martinsohn.dk!
Did you know the BloodHound Query Library now includes a ZIP of all queries in Releases on GitHub for bulk importing?

No more copying queries one by oneβ€”grab & import the whole collection in seconds!

🧡: 1/3

13.02.2026 19:41 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

This is your sign to save your spot in our Detection course at #SOCON2026!

Learn how to identify adversaries using TTPs, uncover telemetry gaps, and build alerts that survive real-world evasion.

Attend in person & get a free conf. pass πŸ‘‰ ghst.ly/socon26-regbsky

13.02.2026 14:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Building an Attack Path Management program is hard. Sustaining one is harder.

Join Robby Winchester & @subat0mik.bsky.social as they introduce BloodHound Scentry, an advisory service to scale APM visibility, remediation & protection across Security, Identity & IT.

➑️ ghst.ly/4tJ4k94

11.02.2026 19:09 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Introducing BloodHound Scentry: BloodHound Enterprise + SpecterOps experts working alongside your team to eliminate attack paths and accelerate APM.

Level 0 β†’ Level 3 maturity in ~6 months. Not theory. Tradecraft. 🎯

Learn more ➑️ ghst.ly/bhscentry-bsky

10.02.2026 15:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Happy #BloodHoundBasics from @andyrobbins.bsky.social!

Want to see attack paths in your own environment? Install BloodHound CE with three commands:

1️⃣ wget ghst.ly/3NTWRmY
2️⃣ tar -xvzf bloodhound-cli-linux-amd64.tar.gz
3️⃣ ./bloodhound-cli install

More info here: ghst.ly/3NMjhqn

30.01.2026 22:58 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Design goals:

βœ… No Azure mgmt APIs from agents
βœ… Per-agent containers (agent-*)
βœ… Container-scoped SAS tokens

Read more: ghst.ly/4bLIGKT

30.01.2026 18:33 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

New from Andrew Gomez + Allen DeMoura: azureBlob, a Mythic C2 profile that uses Azure Blob Storage as transport.Supported Agents:

🐍 Medusa
πŸͺ½ Pegasus (new test agent)
❀️ Your fav agent (with simple integration guide)

ghst.ly/4bLIGKT

30.01.2026 18:33 πŸ‘ 2 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Post image

Identity security in restricted environments shouldn’t be limited to periodic reviews.

BloodHound Enterprise on-premises enables continuous Identity Attack Path Management without cloud connectivity.

Learn more ➑️ ghst.ly/4kadAi0

29.01.2026 17:11 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image

The new Practice Track puts Attack Path Management into action with proven frameworks and real-world case studies. Plus, participate in a hands-on BloodHound Quest lab designed to turn identity risk into measurable outcomes.

🧡: 4/4

27.01.2026 22:35 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

The OpenGraph Track advances Attack Path Management through deep research on identity graphs, hybrid attack paths, and emerging threats.

From hybrid and federated environments to AI & non-human identities, this track pushes the boundaries of identity security research.

🧡: 3/4

27.01.2026 22:35 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

The Tradecraft Track dives into breaking and detecting real adversary behavior through cutting-edge offensive and defensive tradecraft.

Learn how real attackers abuse identity, how those paths evolve, and how defenders can detect and disrupt them in practice.

🧡: 2/4

27.01.2026 22:35 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The #SOCON2026 agenda is live! πŸŽ‰

Explore talks, topics, & speakers across the Tradecraft, OpenGraph, & new Practice Track, focused on turning Attack Path Management into an operational discipline.

Check out the agenda & plan your experience: ghst.ly/socon26-tw

🧡: 1/4

27.01.2026 22:35 πŸ‘ 3 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0

You can enable this functionality in your tenant by going to Administration > BloodHound Configuration > Citrix RDP Support.

🧡: 4/4

23.01.2026 21:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

So when BHE sees that group, it understands Citrix is in control of access. It understands RDP would not lead to interactive desktop compromise and it removes misleading CanRDP edges that would otherwise overstate risk.

🧡: 3/4

23.01.2026 21:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The Citrix "Direct Access Users" group exists specifically to prevent users from RDPing directly into the VDA’s Windows session unless they’re explicitly allowed. The Citrix "Direct Access Users" group is a deny-by-default control.

🧡: 2/4

23.01.2026 21:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

A very happy #BloodHoundBasics day from @psionicjake.github.io!

In BloodHound Enterprise, CanRDP normally means:
"If I compromise this user, I can RDP directly to this machine and land inside Windows."

But Citrix changes what "RDP access" actually means.

🧡: 1/4

23.01.2026 21:01 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Task Failed Successfully - Microsoft’s β€œImmediate” Retirement of MDT - SpecterOps After reporting vulnerabilities found in MDT, Microsoft chose to retire the service rather than fix the issues. As of January 6, 2025, Microsoft stopped supporting MDT and will no longer provide updates, including security patches.

Still running MDT? As of Jan 6, 2026, it’s unsupported and unpatched. In this post, @unsignedsh0rt.bsky.social shows how attackers can locate MDT/WDS (even unauthenticated) and chain issues into credential risk. Defenses included.

Read more: ghst.ly/3LYAuw6

23.01.2026 16:12 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Preview
Updates to the MSSQLHound OpenGraph Collector for BloodHound - SpecterOps MSSQLHound, a PowerShell script that collects security information from remote MSSQL Server instances, now scans remote MSSQL Server instances to determine whether or not NTLM relay attacks are possible, accounts for a recent privilege escalation vulnerability, and includes queries you can import into the BloodHound attack path graph to visualize, navigate, and remediate misconfigurations in MSSQL.

New MSSQLHound updates from Chris Thompson πŸ”₯

Now includes EPA-based NTLM relay scanning, CVE-2025-49758 patch detection, and BloodHound Cypher queries to map + remediate MSSQL attack paths.

Check it out! ghst.ly/4pZqzVe

20.01.2026 18:05 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0