SpecterOps home page
Search...
⌘K
Ask AI
Support
Contact Us
Contact Us
Search...
Navigation
Community and Support
Additional Training and Resources
Home
BloodHound
API Reference
Webinars
Community
Query Library
OpenGraph Library
Blog
Get Started with BloodHound
Introduction to BloodHound
Quickstart
Security Boundaries
Install a Data Collector
Overview
Install SharpHound
Install AzureHound
Collect Data
Overview
Collection Permissions
BloodHound Enterprise Collection
Community Edition Collection
OpenGraph
Overview
Best Practices
OpenGraph Schema
OpenGraph Custom Icons
OpenGraph API
OpenGraph Library
OpenGraph Incentive Program
OpenGraph FAQ
Analyze Attack Path Data
Overview
Privilege Zones
Posture Page
BloodHound Configuration
Accept Attack Path Findings
Search With Cypher
Supported Cypher Syntax
Explore -> Search for Objects
Manage BloodHound
Overview
BloodHound Configuration Supplement
BloodHound Enterprise Compliance Framework
Authentication and Authorization
Securing BloodHound and collectors
API & Integrations
Overview
BloodHound API
Integrations
Resources
Resources
Nodes
Edges
Glossary
Community and Support
Overview
Additional Training and Resources
Get Help and Use the BloodHound Community
Release Notes
Legacy BloodHound
On this page
BloodHound and attack paths
Cypher
Tiering
ADCS
SpecterOps general resources
Community and Support
Additional Training and Resources
BloodHound and attack paths
BloodHound Docs
, searchable for various topics and documentation on edges/attack paths
BloodHound Enterprise: securing Active Directory using graph theory
Attack Path management the BloodHound Enterprise Way
The Ultimate Guide for BloodHound Community Edition
Microsoft Breach — How Can I See This In BloodHound?
Hybrid Attack Paths, New Views and your favorite dog learns an old trick
On-prem Exchange attack paths:
Pwned by the Mail Carrier
The Dog Whisperer’s Handbook
[PDF] (created for the legacy community version, but the concepts still apply)
BloodHound CE + AWS IAM Identity Center
Cypher
Cypher Queries in BloodHound Enterprise
Searching with Cypher
Search the internet for “BloodHound Cypher” for more community guides and cheat sheet
Tiering
“What is Tier Zero” series
Part 1
blog post
and
webinar recording
Part 2
blog post
and
webinar recording
Part 3
webinar recording
Establish security boundaries in your on-prem AD and Azure environment
At the Edge of Tier Zero: The Curious Case of the RODC
ADCS
“ADCS Attack Paths in BloodHound” series
Part 1
blog post
Part 2
blog post
Part 3
blog post
Webinar recording
and
slides
ADCS ESC14 Abuse Technique
ADCS ESC13 Abuse Technique
SpecterOps general resources
SpecterOps blog
- topics are BloodHound, detection and adversary tradecraft
SpecterOps events
- upcoming talks, webinars, gatherings and our training courses
SpecterOps on YouTube
SpecterOps on X
Overview
Get Help and Use the BloodHound Community
Assistant
Responses are generated using AI and may contain mistakes.