Defining the Undefined: What is Tier Zero

Getting Started with BHE — Part 2

Getting Started with BHE — Part 2Contextualizing Tier ZeroTL;DRAn accurately defined Tier Zero provides an accurate depiction of Attack Path Findings in your BHE tenant.Different principals (groups, GPOs, OUs, etc.) have different implications when Tier Zero is ...
Getting Started with BHE — Part 1

Getting Started with BHE — Part 1

Getting Started with BHE — Part 1Understanding Collection, Permissions, and Visibility of Your EnvironmentTL;DRAttack Path visibility is dependent upon scope of collection; complete collection is dependent upon appropriate permissions.Your collection strategy benefits from tiering just ...
Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

General Availability of Improved Analysis Algorithm and Security Posture Management ImprovementsThe BloodHound team previewed several concepts in the last couple of releases that made it easier for customers to visualize attack paths ...
Insurance companies can reduce risk with Attack Path Management

Insurance companies can reduce risk with Attack Path Management

TL;DRInsurance companies host large amounts of sensitive data (PII, PHI, etc.) and often have complex environments due to M&A and divestituresMost breaches start with human errorFortune 500 companies rely on Microsoft Active Directory ...
Entra Connect Attacker Tradecraft: Part 2

Entra Connect Attacker Tradecraft: Part 2

Now that we know how to add credentials to an on-premises user, lets pose a question:“Given access to a sync account in Domain A, can we add credentials to a user in ...
Introducing BloodHound CLI

Introducing BloodHound CLI

We created a new tool to help you install and manage BloodHound instances, BloodHound CLI!GitHub - SpecterOps/bloodhound-cliWritten entirely in Go, this command-line tool can be cross-compiled to support Windows, macOS, and Linux, ...
Intune Attack Paths — Part 1

Intune Attack Paths — Part 1

Intune Attack Paths — Part 1Prior WorkSeveral people have recently produced high-quality work around Intune tradecraft. I want to specifically mention:Chris Thompson and his work on MaestroDirk-jan Mollema and his work with Primary Refresh TokensAdam Chester and ...
Attacking Entra Metaverse: Part 1

Attacking Entra Metaverse: Part 1

This is part one in a two (maybe three…) part series regarding attacker tradecraft around the syncing mechanics between Active Directory and Entra. This first blog post is a short one, and ...
Unwrapping BloodHound v6.3 with Impact Analysis

Unwrapping BloodHound v6.3 with Impact Analysis

Just in time for the holidays, sharper tools for faster defenseToday, the SpecterOps team rolled out a number of new features, product enhancements, and recommendations intended to help users of BloodHound Enterprise and ...
Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

In conversation: Pete McKernan & Luke LuckettAs organizations seek to wrap their arms around potential cybersecurity exposures, CIOs and CISOs are increasingly pushing their vulnerability management teams to widen scope. With such a ...