Enter your Cypher query & preview nodes via “Update Sample Results.” Happy with it? Click “Save” — done!
🧵: 2/3
Enter your Cypher query & preview nodes via “Update Sample Results.” Happy with it? Click “Save” — done!
🧵: 2/3
highlights a powerful new feature you might’ve missed: Cypher Selectors for Privilege Zones.
Why powerful? Unlike classic objectid selectors, Cypher selectors use complex conditions & can be created before the node exists.
🧵: 1/3
highlights a powerful new feature you might’ve missed: Cypher Selectors for Privilege Zones.
Why powerful? Unlike classic objectid selectors, Cypher selectors use complex conditions & can be created before the node exists.
🧵: 1/3
In-person attendees also receive a free conference pass. Save your spot ➡️ ghst.ly/socon-2026
In-person attendees also receive a free conference pass. Save your spot ➡️ ghst.ly/socon-2026
Join Nick Powers & @tw1sm.bsky.social TOMORROW as they share new methods to enumerate EPA enforcement across MSSQL, HTTP, & more—and intro RelayInformer, expanding attacker-perspective coverage for key protocols.
Grab your spot → ghst.ly/oct-web-bsky
Join Nick Powers & @tw1sm.bsky.social TOMORROW as they share new methods to enumerate EPA enforcement across MSSQL, HTTP, & more—and intro RelayInformer, expanding attacker-perspective coverage for key protocols.
Grab your spot → ghst.ly/oct-web-bsky
Elad Shamir discusses BloodHound OpenGraph's journey, the challenges of modeling adversary tradecraft, and the Clean Source Principle w/ Jared Atkinson and Justin Kohler in the latest #KnowYourAdversary.
🎧: ghst.ly/4ommfPu
Elad Shamir discusses BloodHound OpenGraph's journey, the challenges of modeling adversary tradecraft, and the Clean Source Principle w/ Jared Atkinson and Justin Kohler in the latest #KnowYourAdversary.
🎧: ghst.ly/4ommfPu
Go back ⬅️, forward ➡️, & share your BloodHound view 👀. Earlier this year, we added Back button support directly through your browser. You can also copy your current URL & share it with a teammate so they see what you see.
Go back ⬅️, forward ➡️, & share your BloodHound view 👀. Earlier this year, we added Back button support directly through your browser. You can also copy your current URL & share it with a teammate so they see what you see.
🧵 5/5
🧵 5/5
🧵 4/5
🧵 4/5
The linked Gist contains a PowerShell script to gather this information and is stored in the variable $results (4). ghst.ly/4hpdHFa
🧵 3/5
The linked Gist contains a PowerShell script to gather this information and is stored in the variable $results (4). ghst.ly/4hpdHFa
🧵 3/5
🧵 2/5
🧵 2/5
🧵 1/5
🧵 1/5
DYK: Risk calculation in BHE findings can be based on different values—some use Exposure (inbound control), others Impact (outbound). Hover over a finding in the Attack Paths page to see which applies.
DYK: Risk calculation in BHE findings can be based on different values—some use Exposure (inbound control), others Impact (outbound). Hover over a finding in the Attack Paths page to see which applies.
Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community.
Submit your talk by Nov. 15 → ghst.ly/socon26-cfp
Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community.
Submit your talk by Nov. 15 → ghst.ly/socon26-cfp
3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy.
🎟️ Save 25% with early bird: specterops.io/so-con
3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy.
🎟️ Save 25% with early bird: specterops.io/so-con
🧵: 5/5
🧵: 5/5
🧵: 4/5
🧵: 4/5
4️⃣ Click on Play/Your URL
🧵: 3/5
4️⃣ Click on Play/Your URL
🧵: 3/5
Register & save your spot ➡️ ghst.ly/specter-bash-2025
Register & save your spot ➡️ ghst.ly/specter-bash-2025
Jared Atkinson & Justin Kohler explore identity security from the attacker's perspective. Real stories, real tactics, real insights.
Check out our first three episodes now 👉 ghst.ly/kya-podcast
Jared Atkinson & Justin Kohler explore identity security from the attacker's perspective. Real stories, real tactics, real insights.
Check out our first three episodes now 👉 ghst.ly/kya-podcast
🧵 5/6
🧵 5/6
✅ Get User objects with managers
✅ Get the manager User objects
✅ Create an OpenGraph JSON structure with the ManagerOf edge
🧵 4/6
✅ Get User objects with managers
✅ Get the manager User objects
✅ Create an OpenGraph JSON structure with the ManagerOf edge
🧵 4/6
@andyrobbins.bsky.social has written extensively about model design: ghst.ly/46tAkmO
A shorter version is in the BloodHound OpenGraph docs: ghst.ly/48vo0EW
🧵 3/6
@andyrobbins.bsky.social has written extensively about model design: ghst.ly/46tAkmO
A shorter version is in the BloodHound OpenGraph docs: ghst.ly/48vo0EW
🧵 3/6
🧵 2/6
🧵 2/6
Today is a demo of how BloodHound's #OpenGraph helped a customer build ManagerOfHound.ps1 - going from attack path concept to a custom "ManagerOf" edge in BloodHound. Can it fit in a thread? Let's see...
🧵 1/6
Today is a demo of how BloodHound's #OpenGraph helped a customer build ManagerOfHound.ps1 - going from attack path concept to a custom "ManagerOf" edge in BloodHound. Can it fit in a thread? Let's see...
🧵 1/6