Andy Robbins
5.4K posts

Andy Robbins
@_wald0
Co-founder of SpecterOps. Co-creator of BloodHound. https://t.co/rub1i3Fs9g
Seattle, WA เข้าร่วม Mart 2011
1.5K กำลังติดตาม36.2K ผู้ติดตาม
ทวีตที่ปักหมุด
Andy Robbins รีทวีตแล้ว

My SCCM BloodHound OpenGraph collector, ConfigManBearPig, is finally ready to share! It can enumerate all of the relay TAKEOVERs and a few CRED and ELEVATE techniques from Misconfiguration Manager with just a domain account. Let me know what you find! specterops.io/blog/2026/01/1…
English
Andy Robbins รีทวีตแล้ว

Stack spoofing isn’t dead.
Hear from @klezvirus at #BHEU on how modern detection still breaks, and unveils the first CET-compliant stack spoofing framework.
Learn more ➡️ ghst.ly/4izmuou

English
Andy Robbins รีทวีตแล้ว
Andy Robbins รีทวีตแล้ว

SCOM monitors critical systems, but insecure defaults make it a powerful attack vector.
At #BHEU, @unsigned_sh0rt & @breakfix show how to abuse SCOM for credential theft, lateral movement, and domain escalation, plus how to defend it. ghst.ly/4aoggph

English
Andy Robbins รีทวีตแล้ว

Just in time for the holidays, I wanted to share something that a lot of people have asked for: youtube.com/playlist?list=…
Short videos about Mythic development and customizations. This is just the start - I'll release a survey soon that'll get feedback for the next batch :)
GIF
English
Andy Robbins รีทวีตแล้ว

Credential Guard was supposed to end credential dumping. It didn't.
@bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.
Read for more ⤵️ ghst.ly/4qtl2rm
English
Andy Robbins รีทวีตแล้ว

In this post @_wald0 introduces PingOneHound, a BloodHound OpenGraph extension that allows users to visualize, audit, and remediate attack paths in their PingOne environment. The blog post also serves as an introduction to the PingOne architecture.
specterops.io/blog/2025/10/2…
English
Andy Robbins รีทวีตแล้ว

BloodHound isn't just for Active Directory anymore. 🤯
@SadProcessor dives into the BloodHound OpenGraph functionality & demonstrates the new PowerShell cmdlets added to the BloodHound Operator module to work with the OpenGraph feature. ghst.ly/4peTTrB
English
Andy Robbins รีทวีตแล้ว

ICYMI: BloodHound OpenGraph, introduced with BloodHound v8.0, allows you to map attack paths across your entire tech stack. @JustinKohler10 & @_wald0 recently joined @_JohnHammond to discuss the new feature and share a demo.
Watch the conversation 👉 ghst.ly/4fNZLDM
English

🚨 New #BloodHound shirt alert 🚨
✅ - Unisex and ladies sizes available
✅ - Cool design :)
✅ - ALL profits go to charity:
Hope for HIE, which supports families suffering the effects of hypoxic ischemic encephalopathy
Get your shirt here: ghst.ly/bh8-tshirt
English
Andy Robbins รีทวีตแล้ว

We are back with our BloodHound t-shirt fundraiser! 🙌
Grab your BloodHound 8.0 shirt today. All funds raised will go directly to @HopeforHIE, the global voice for families affected by Hypoxic Ischemic Encephalopathy.
👕: ghst.ly/bh8-tshirt

English
Andy Robbins รีทวีตแล้ว

Check out my new blog on nested app authentication and brokered authentication.
SpecterOps@SpecterOps
Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @Icemoonhsv breaks down NAA and shows how attackers can pivot between Azure resources using brokered authentication. ghst.ly/45h2Zw3
English
Andy Robbins รีทวีตแล้ว

Dear fellow pentesters & red teamers,
How often do you run into a vCenter in your client’s environment? 🖥️
I just built one for vCenter - meet vCenterHound 🐾😉
This is just the beginning… more collectors and surprises are on the way.
#Pentesting #RedTeam #BloodHound #vCenter

English
Andy Robbins รีทวีตแล้ว

This post about MSSQLHound, a PowerShell collector that adds 7 new nodes and 37 new edges to BloodHound, details my experience and lessons learned designing and implementing the tool using OpenGraph and provides examples of how to research and discover MSSQL attack paths.
SpecterOps@SpecterOps
MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without touching the SharpHound & BloodHound codebases. @_Mayyhem unpacks this new feature in his blog post. 👇 ghst.ly/4leRFFn
English
Andy Robbins รีทวีตแล้ว

MSSQL support just landed in BloodHound! You can now map out how attackers might use SQL servers to move laterally. This is incredibly useful in hybrid and legacy heavy environments. Let us know what you find.
Learn more ➡️ ghst.ly/MSSQLHound

English
Andy Robbins รีทวีตแล้ว

MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without touching the SharpHound & BloodHound codebases.
@_Mayyhem unpacks this new feature in his blog post. 👇 ghst.ly/4leRFFn
English
Andy Robbins รีทวีตแล้ว

More on BH OpenGraph: Ran into some issues when attempting to map objects collected with partial info back to existing BH objects. Built out a small tool that allows for connecting objects in a more flexible manner: github.com/G0ldenGunSec/O…
English

In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound: specterops.io/blog/2025/08/0…
English
Andy Robbins รีทวีตแล้ว

Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and conditional access bypass.
@hotnops explores cross-domain compromise tradecraft within the same tenant.
Read more ⤵️ ghst.ly/3ISMGN9
English


