SpecterOps
@specterops.io
1.1K followers 60 following 390 posts
Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management
Posts Media Videos Starter Packs
Pinned
specterops.io
The only conference dedicated to Attack Path Management is back!

3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy.

🎟️ Save 25% with early bird: specterops.io/so-con
specterops.io
Celebrating #BloodHoundBasics day w/ Nathan Davis!

DYK: Risk calculation in BHE findings can be based on different values—some use Exposure (inbound control), others Impact (outbound). Hover over a finding in the Attack Paths page to see which applies.
specterops.io
The CFP for #SOCON2026 is OPEN! 🙌

Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community.

Submit your talk by Nov. 15 → ghst.ly/socon26-cfp
specterops.io
Your strongest platform is only as secure as its weakest dependency. And you probably don't know what those are.

Jared Atkinson dives into the Clean Source Principle, hidden trust relationships, & why BloodHound OpenGraph changes the game. ghst.ly/4pYTtFU
The Clean Source Principle and the Future of Identity Security - SpecterOps
TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no matter how strong any single platform appears. The Clean Source Principle and BloodHound ...
ghst.ly
specterops.io
Possession of that password enables authentication as the GMSA, and potentially allows for further attack paths depending on the privileges held by the GMSA.

Read more about this edge here: ghst.ly/42lMeho

🧵: 3/3
ReadGMSAPassword - SpecterOps
This privilege allows you to read the password for a Group Managed Service Account (GMSA).
ghst.ly
specterops.io
The ReadGMSAPassword edge indicates that a principal can request the account's current password from a Domain Controller.

🧵: 2/3
specterops.io
It's another #BloodHoundBasics day with @andyrobbins.bsky.social!

Today we are highlighting the ReadGMSAPassword edge.

A GMSA is an Active Directory object. GMSA stands for Group-Managed Service Account - a great solution from Microsoft that we recommend organizations use!

🧵: 1/3
specterops.io
Red teams slip past detection. Defenders adapt. The cycle continues. 🔄

John Wotton's latest on AI gated loaders shows how offensive operators are using LLMs to make shellcode execution context-aware, executing only when OPSEC policies are met. ghst.ly/4nvxsgh
AI Gated Loader: Teaching Code to Decide Before It Acts - SpecterOps
My eyes and ears when I cannot be there, AI gated loaders inspect the victim machine and wait for the right moment to execute.
ghst.ly
specterops.io
The only conference dedicated to Attack Path Management is back!

3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy.

🎟️ Save 25% with early bird: specterops.io/so-con
specterops.io
Lateral movement getting blocked by traditional methods?

@werdhaihai.bsky.social just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG
DCOM Again: Installing Trouble - SpecterOps
DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs
ghst.ly
specterops.io
6️⃣ Give the query a Name (and a description if you want) and click Save.

🧵: 5/5
specterops.io
5️⃣ Your instance of BH will open and the query will run automatically. You can now click on Save.

🧵: 4/5
specterops.io
3️⃣ Enter your instance's URL
4️⃣ Click on Play/Your URL

🧵: 3/5
specterops.io
1️⃣ Head to queries.specterops.io
2️⃣ Click on Run Query

🧵: 2/5
specterops.io
Happy #BloodHoundBasics Day from @scoubi.bsky.social!

By now, you've probably heard about our Query Library. But did you know you can run any query in your own instance of BHE/BHCE and then save the query to your Personal Library?

Follow the steps threaded below!

🧵: 1/5
specterops.io
It's time to change how you think about SaaS integrations.

The Salesloft attack shows how GitHub → AWS → Drift → Salesforce created an attack highway defenders never saw coming.

Jared Atkinson's analysis details the patterns we should look out for. ghst.ly/4ngDQrD
The Salesloft–Drift Breach: An Attack Path Case Study - SpecterOps
This post analyzes the Salesloft–Drift incident through an attack path lens, showing how violations of the clean source principle, identities in transit, and hidden hybrid paths combined to turn a sin...
ghst.ly
specterops.io
Learn to detect adversary TTPs through behavioral analysis, not just malware signatures. Our Detection course at Specter Bash teaches you to engineer detections based on attacker tactics and techniques.

Register & save your spot ➡️ ghst.ly/specter-bash-2025
specterops.io
🎙️ NEW PODCAST: #KnowYourAdversary

Jared Atkinson & Justin Kohler explore identity security from the attacker's perspective. Real stories, real tactics, real insights.

Check out our first three episodes now 👉 ghst.ly/kya-podcast
specterops.io
Which organization-specific attack paths exist in your infrastructure? Are you assessing risk w/ them in mind?

ManagerOfHound.ps1 is open-source on GitHub: ghst.ly/46A5usH

Discover more BloodHound OpenGraph extensions: ghst.ly/4mt0r34

🧵 6/6
specterops.io
The JSON can then be ingested by BloodHound CE & Enterprise. Security teams can now search for organization-specific attack paths involving ManagerOf, for example, validating that no subordinate is a higher tier than their manager.

🧵 5/6
specterops.io
Vibe-coding a collector (ManagerOfHound.ps1) that will:

✅ Get User objects with managers
✅ Get the manager User objects
✅ Create an OpenGraph JSON structure with the ManagerOf edge

🧵 4/6
specterops.io
We create this attack graph model in arrows.app

@andyrobbins.bsky.social has written extensively about model design: ghst.ly/46tAkmO

A shorter version is in the BloodHound OpenGraph docs: ghst.ly/48vo0EW

🧵 3/6
specterops.io
First, some background: the customer has a portal where managers can reset passwords of their subordinates. In Active Directory, a subordinate's 'Manager' attribute is populated with the manager's 'DistinguishedName' attribute.

🧵 2/6
specterops.io
New #BloodHoundBasics post from @martinsohn.dk ‼️

Today is a demo of how BloodHound's #OpenGraph helped a customer build ManagerOfHound.ps1 - going from attack path concept to a custom "ManagerOf" edge in BloodHound. Can it fit in a thread? Let's see...

🧵 1/6
specterops.io
Win32_Process has been the go to WMI class for remote command execution for years.

Steven Flores explores a new WMI class that functions like Win32_Process and offers further capability. Read more: ghst.ly/4gyPbkr
More Fun With WMI - SpecterOps
TL;DR Win32_Process has been the go to WMI class for remote command execution for years. In this post we will cover a new WMI class that functions like Win32_Process and offers further capability From...
ghst.ly
specterops.io
Last call! Our #military to #cybersecurity webinar is tomorrow, and there's still time to save your spot.

Get the real playbook from #veterans on our team:
✅ Resume strategies that work
✅ Application timing
✅ Consultant life insights

Don't miss out 👉 ghst.ly/sep-web-bsky