SpecterOps

3.7K posts

SpecterOps banner
SpecterOps

SpecterOps

@SpecterOps

Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management

Beigetreten Ocak 2017
401 Folgt40.4K Follower
Angehefteter Tweet
SpecterOps
SpecterOps@SpecterOps·
The #SOCON2026 agenda is live! 🎉 Explore talks, topics, & speakers across the Tradecraft, OpenGraph, & new Practice Track, focused on turning Attack Path Management into an operational discipline. Check out the agenda & plan your experience: ghst.ly/socon26-tw 🧵: 1/4
English
1
2
13
4.4K
SpecterOps
SpecterOps@SpecterOps·
LIMIT statements are optional, but recommended for queries that may return many objects. LIMIT 1000 is the default, but using LIMIT 10 or 100 helps quickly check if your query returns results. 🧵: 5/5
English
0
0
0
142
SpecterOps
SpecterOps@SpecterOps·
RETURN statements can return any variable declared in the query. In the above example, that includes p (variable representing the whole relationship), a (just the User accounts), or b (just the computers). 🧵: 4/5
English
1
0
0
144
SpecterOps
SpecterOps@SpecterOps·
Happy #BloodHoundBasics day from @Sec_Distilled! Having trouble getting started w/ Cypher queries? Here's a quick intro to get you going: Start w/ a MATCH statement, use a WHERE clause to refine, & RETURN your data (don't forget a LIMIT statement, just in case). Query in 🧵⤵️
SpecterOps tweet media
English
1
1
3
315
SpecterOps
SpecterOps@SpecterOps·
What if the attack paths you’re missing are outside your core identity stack? 🤔 Join @JustinKohler10 & @jaredcatkinson March 31 to see how BloodHound Enterprise now maps risk across Okta, GitHub, and Mac environments. Save your spot! ghst.ly/4bFEnir
SpecterOps tweet media
English
0
3
10
1.1K
SpecterOps
SpecterOps@SpecterOps·
Supply chain attacks propagate through relationships. Shai-Hulud 2.0 proved it. @c0kernel breaks down the worm used in the attack as an attack graph & introduces NPMHound, which can be used to model NPM dependencies in BloodHound. Read for more! ⤵️ ghst.ly/4smZVqE
English
0
9
15
1.5K
SpecterOps
SpecterOps@SpecterOps·
What do hundreds of incident response engagements reveal? Identity is the battleground. ⚔️ Steve Elovitz from @Unit42_Intel joins #KnowYourAdversary to break down how attacks unfold, from phishing to privilege escalation to SaaS expansion. 🎧: ghst.ly/4uFeMie
English
0
2
6
1.3K
SpecterOps
SpecterOps@SpecterOps·
GitHub isn’t just a code platform anymore. It’s a security boundary. New from @jaredcatkinson: how GitHub creates real attack paths into repos, secrets, CI/CD, and even cloud environments. Read more: ghst.ly/4cU3QHd
English
0
25
92
5.8K
SpecterOps
SpecterOps@SpecterOps·
You can also catch @JustinKohler10 this morning on @_JohnHammond’s live stream chatting all things BloodHound OpenGraph. Tune in on John’s channels at 10:30AM ET / 7:30AM PT. 🧵: 3/3
SpecterOps tweet media
English
0
1
7
2.6K
SpecterOps
SpecterOps@SpecterOps·
Want to learn more? Find us at Booth N-6277 at #RSAC to chat with the team about BloodHound OpenGraph and these new extensions! 🧵: 2/3
SpecterOps tweet media
English
1
0
3
609
SpecterOps
SpecterOps@SpecterOps·
BloodHound Enterprise is expanding. New OpenGraph extensions now uncover identity attack paths across Okta, GitHub, and Jamf-managed macOS—connecting identities, repositories, and endpoints across hybrid environments. ghst.ly/3N7X7yY 🧵: 1/3
SpecterOps tweet media
English
1
9
28
2.4K
SpecterOps
SpecterOps@SpecterOps·
Get a jump start and check out @_JohnHammond's stream from today where he explored the functionality of BloodHound OpenGraph! 👀: ghst.ly/4bi2BjW (2/2)
English
0
0
4
774
SpecterOps
SpecterOps@SpecterOps·
Don't miss this: @JustinKohler10 will join @_JohnHammond live to talk all things BloodHound OpenGraph—what it is, why it matters, and what’s coming next. 🔴 Tune in live TOMORROW at 10:30AM ET / 7:30AM PT! (1/2)
SpecterOps tweet media
English
1
3
6
6.1K
SpecterOps
SpecterOps@SpecterOps·
Heading to #RSAC next week? 🧳 Stop by booth N-6277 for live BloodHound demos and see how teams are eliminating identity-based attack paths. Our exec team will also be on-site to chat. Book your meeting ➡️ ghst.ly/3NezMLJ
SpecterOps tweet media
English
0
0
2
1.2K
SpecterOps
SpecterOps@SpecterOps·
Here are the instructions for creating a gMSA for your SharpHound collector: ghst.ly/4ur3mhN 🧵: 5/5
English
0
0
3
767
SpecterOps
SpecterOps@SpecterOps·
Combined w/ other hardening strategies such as the Protected Users group (enforces stricter auth & doesn't store credentials locally), & disabling outbound NTLM (prevents machines from sending NTLM credentials to other systems). This is just good security hygiene. 🧵: 4/5
English
1
0
1
758
SpecterOps
SpecterOps@SpecterOps·
Happy #BloodHoundBasics day from @psionicjake! Why do we recommend a Group Managed Service Account for SharpHound? Security. When you use a gMSA as a service principal for running SharpHound, Windows manages the p/w for the account. Not an admin. 🧵: 1/5
SpecterOps tweet media
English
1
8
49
5.7K