SpecterOps's profile picture. Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management

SpecterOps

@SpecterOps

Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management

Pinned

The only conference dedicated to Attack Path Management is back! 3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy. 🎟️ Save 25% with early bird: specterops.io/so-con

SpecterOps's tweet image. The only conference dedicated to Attack Path Management is back!

3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy.

🎟️ Save 25% with early bird: specterops.io/so-con

Celebrating #BloodHoundBasics day w/ @sec_distilled! DYK: Risk calculation in BHE findings can be based on different values—some use Exposure (inbound control), others Impact (outbound). Hover over a finding in the Attack Paths page to see which applies.


The CFP for #SOCON2026 is OPEN! 🙌 Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community. Submit your talk by Nov. 15 → ghst.ly/socon26-cfp

SpecterOps's tweet image. The CFP for #SOCON2026 is OPEN! 🙌

Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community.

Submit your talk by Nov. 15 → ghst.ly/socon26-cfp

"It’s easier said than done, blocking outbound traffic. Inbound rules work, but outbound rules don’t cover everything. There are some issues, some gotchas." - @MGrafnetter speaking on how to secure Domain Controllers without breaking Active Directory at #HIPConf25.

SpecterOps's tweet image. "It’s easier said than done, blocking outbound traffic. Inbound rules work, but outbound rules don’t cover everything. There are some issues, some gotchas."

- @MGrafnetter speaking on how to secure Domain Controllers without breaking Active Directory at #HIPConf25.

Happening soon: @MGrafnetter's talk at #HIPConf25 on securing Domain Controllers without breaking AD. Hear about IaC approach to Windows Firewall policy, RPC filters & outbound traffic controls, hybrid environment challenges, & network service discovery. ghst.ly/3W6nxlc

SpecterOps's tweet image. Happening soon: @MGrafnetter's talk at #HIPConf25 on securing Domain Controllers without breaking AD.

Hear about IaC approach to Windows Firewall policy, RPC filters & outbound traffic controls, hybrid environment challenges, & network service discovery.

ghst.ly/3W6nxlc

Your strongest platform is only as secure as its weakest dependency. And you probably don't know what those are. @jaredcatkinson dives into the Clean Source Principle, hidden trust relationships, & why BloodHound OpenGraph changes the game. ghst.ly/4pYTtFU


If you're at #HIPConf25, catch @JustinKohler10's talk starting soon! Hear how you can use tools like BloodHound to reveal hidden attack paths & how to shift from playing defense to getting ahead of threats. ghst.ly/3W6nxlc

SpecterOps's tweet image. If you're at #HIPConf25, catch @JustinKohler10's talk starting soon! 
Hear how you can use tools like BloodHound to reveal hidden attack paths & how to shift from playing defense to getting ahead of threats. ghst.ly/3W6nxlc

Identity = the new attack surface. Our Identity-driven Offensive Tradecraft course teaches you to exploit auth mechanisms, cross tenants, and forge attack paths in hybrid environments. Save your spot in this course at #BHEU. Register today! ghst.ly/4gXTQg3

SpecterOps's tweet image. Identity = the new attack surface.

Our Identity-driven Offensive Tradecraft course teaches you to exploit auth mechanisms, cross tenants, and forge attack paths in hybrid environments.

Save your spot in this course at #BHEU. Register today! ghst.ly/4gXTQg3

Identity security isn't one-size-fits-all. @jaredcatkinson spoke to @campuscodi for Risky Business News about how classifying identities into two distinct categories — identities at rest and identities in transit — changes how we approach security. 🎧: ghst.ly/4pB9rWL


Certificate-based privilege escalation vulnerabilities are the attack vector enterprises keep overlooking. Join @leidy_tector at #BSidesNYC on Oct. 18 to learn a structured approach to ADCS remediation using attack path analysis and BloodHound Enterprise. ghst.ly/3J0BxKt

SpecterOps's tweet image. Certificate-based privilege escalation vulnerabilities are the attack vector enterprises keep overlooking.

Join @leidy_tector at #BSidesNYC on Oct. 18 to learn a structured approach to ADCS remediation using attack path analysis and BloodHound Enterprise. ghst.ly/3J0BxKt

Red teams slip past detection. Defenders adapt. The cycle continues. 🔄 John Wotton's latest on AI gated loaders shows how offensive operators are using LLMs to make shellcode execution context-aware, executing only when OPSEC policies are met. ghst.ly/4nvxsgh


Securing Domain Controllers without breaking AD is harder than it sounds. @MGrafnetter at @HIPConf covers: ✅ IaC approach to Windows Firewall policy ✅ RPC filters & outbound traffic controls ✅ Hybrid environment challenges ✅ Network service discovery hipconf.com/agenda/

SpecterOps's tweet image. Securing Domain Controllers without breaking AD is harder than it sounds. @MGrafnetter at @HIPConf covers:

✅ IaC approach to Windows Firewall policy
✅ RPC filters & outbound traffic controls
✅ Hybrid environment challenges
✅ Network service discovery

hipconf.com/agenda/

What happens when the User-Account-Restrictions property gets misconfigured? Spoiler: It's not good. From account compromise to full domain takeover, @unsigned_sh0rt breaks down why this permission set is more dangerous than most realize. ghst.ly/4mKgycH


Move beyond signature-based detection to catch what traditional defenses miss. Our Detection course at Specter Bash next week will teach you to engineer detections based on adversary TTPs & behavioral analysis. There's still time to save your spot! 👉 lnkd.in/eP58JqcU

SpecterOps's tweet image. Move beyond signature-based detection to catch what traditional defenses miss. Our Detection course at Specter Bash next week will teach you to engineer detections based on adversary TTPs & behavioral analysis.

There's still time to save your spot! 👉 lnkd.in/eP58JqcU

Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG


Loading...

Something went wrong.


Something went wrong.