SpecterOps

3.7K posts

SpecterOps banner
SpecterOps

SpecterOps

@SpecterOps

Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management

Beigetreten Ocak 2017
401 Folgt40.5K Follower
Angehefteter Tweet
SpecterOps
SpecterOps@SpecterOps·
The #SOCON2026 agenda is live! 🎉 Explore talks, topics, & speakers across the Tradecraft, OpenGraph, & new Practice Track, focused on turning Attack Path Management into an operational discipline. Check out the agenda & plan your experience: ghst.ly/socon26-tw 🧵: 1/4
English
1
2
13
4.7K
SpecterOps
SpecterOps@SpecterOps·
Don’t miss @Icemoonhsv at #BSidesSD 🔥 Deep dive into NAA, brokered client IDs, and how token flows behave (and break) in Microsoft environments. Learn more: bsidessd.org
SpecterOps tweet media
English
0
1
4
654
SpecterOps
SpecterOps@SpecterOps·
Friday = #BloodHoundBasics, this week courtesy for @_wald0! BloodHound is extensible - you can add your own nodes and edges from any source with BloodHound's "OpenGraph". Get started here → ghst.ly/3PmS0f1
SpecterOps tweet media
English
0
6
18
1.5K
SpecterOps
SpecterOps@SpecterOps·
Thanks to everyone who stopped by to connect with our team at #RSAC! This week was packed with great conversations, great energy, and valuable insight into today’s security challenges. Let’s keep those conversations going!
SpecterOps tweet mediaSpecterOps tweet mediaSpecterOps tweet mediaSpecterOps tweet media
English
1
0
8
1.1K
SpecterOps
SpecterOps@SpecterOps·
Stop asking LLMs to “find vulns.” Start using them to understand code. @Sw4mp_f0x walks through using Claude Code as a force multiplier in app assessments - faster analysis, fewer false positives, better outcomes. Check it out: ghst.ly/4rA3uJd
English
4
149
747
42.3K
SpecterOps
SpecterOps@SpecterOps·
Swag game = 🔥 Grab our Credential Shuffle card game for your own table top fun! We may or may not have t-shirts as well 👀
SpecterOps tweet media
English
0
0
13
1.6K
SpecterOps
SpecterOps@SpecterOps·
Good morning #RSAC! ☀️ Our team is back for another day on the expo floor. Stop by booth N-6277 to see BloodHound Enterprise in action and get the answers to your Identity Attack Path Management questions!
English
0
0
1
1.1K
SpecterOps
SpecterOps@SpecterOps·
Identity moves across systems like AD, Okta, Entra, & GitHub. A compromise in one place can quickly turn into control somewhere else. @jaredcatkinson breaks down how we modeled Okta in BloodHound Enterprise to make those attack paths visible. Learn more: ghst.ly/3PpLKmJ
English
0
6
15
1.9K
SpecterOps
SpecterOps@SpecterOps·
The origin of critical misconfigurations may be a trusted vendor of yours. @martinsohndk's latest research found official documentation across 16 vendors introducing critical attack paths, often through AD CS misconfigurations. Check it out: ghst.ly/4dEWeIH
English
2
14
30
3.2K
SpecterOps
SpecterOps@SpecterOps·
“The attack path to breach your environment already exists. You just haven’t seen it yet.” - @JustinKohler10 during his talk at #RSAC. Thank you to everyone who stopped by!
SpecterOps tweet media
English
0
2
15
1.3K
SpecterOps
SpecterOps@SpecterOps·
The #RSAC Expo is open! 🙌 Stop by booth N-6277 to see BloodHound Enterprise in action and chat with the Specter team about our latest OpenGraph extensions for GitHub, Okta, and Jamf.
English
0
0
4
1.4K
SpecterOps
SpecterOps@SpecterOps·
Don't miss @JustinKohler10 at #RSAC today at 10:40AM! Swing by the South Briefing Center Theater & hear how BloodHound now reveals cross-platform identity attack paths beyond traditional directories, exposing the relationships attackers exploit & defenders rarely understand.
SpecterOps tweet media
English
0
1
5
1K
SpecterOps
SpecterOps@SpecterOps·
The #RSAC opening reception is underway! Stop by booth N-6277 to say hi to the team 👋
SpecterOps tweet media
English
1
1
7
1.1K
SpecterOps
SpecterOps@SpecterOps·
In his latest research, @MGrafnetter looks at Okta attack paths, and where they actually show up. Not in Okta itself, but in everything connected to it. With OktaHound you can map that in BloodHound. Check it out! ghst.ly/4dyLThw
English
0
26
48
4.4K
SpecterOps
SpecterOps@SpecterOps·
BloodHound Enterprise + ServiceNow Vulnerability Response is here. Identity attack path findings demand action. This integration automates vulnerable item creation & mgmt, connecting discovery directly to remediation. Learn more: ghst.ly/47yzgiH See it in action ⤵️
English
0
3
16
2.3K
SpecterOps
SpecterOps@SpecterOps·
LIMIT statements are optional, but recommended for queries that may return many objects. LIMIT 1000 is the default, but using LIMIT 10 or 100 helps quickly check if your query returns results. 🧵: 5/5
English
0
0
0
561
SpecterOps
SpecterOps@SpecterOps·
RETURN statements can return any variable declared in the query. In the above example, that includes p (variable representing the whole relationship), a (just the User accounts), or b (just the computers). 🧵: 4/5
English
1
0
0
582
SpecterOps
SpecterOps@SpecterOps·
Happy #BloodHoundBasics day from @Sec_Distilled! Having trouble getting started w/ Cypher queries? Here's a quick intro to get you going: Start w/ a MATCH statement, use a WHERE clause to refine, & RETURN your data (don't forget a LIMIT statement, just in case). Query in 🧵⤵️
SpecterOps tweet media
English
1
2
19
2K