Andy Robbins

BloodHound, BloodHound Enterprise, SpecterOps

2025-01-22

@Lee_Holmes Great picture!

2025-01-15

With thanks and acknowledgement to:

Chris Thompson - x.com/_Mayyhem
Dirk-jan Mollema - bsky.app/profile/dirkjanm.io
Adam Chester - bsky.app/profile/xpnsec.com
Brett Hawkins - bsky.app/profile/h4wkst3r.bsky
Thibault Van Geluwe de Berlaere - linkedin.com/in/thibault-van-g
Karl M. - linkedin.com/in/karl-m-937b8b1
Corné de Jong - linkedin.com/in/corn%C3%A9-de-
Dr. Nestori Syynimaa - x.com/DrAzureAD
Rudy Ooms - x.com/Mister_MDM

2025-01-15

In Part 1 of my Intune Attack Paths series, I discuss the fundamental components and mechanics of Intune that lead to the emergence of attack paths: posts.specterops.io/intune-att

Andy Robbins boosted:
Lee Holmes :donor:Lee_Holmes@infosec.exchange
2025-01-09

Console user and have an Azure subscription? Give this a go. Having ai.exe in the console rather than locked behind a web app opens up incredible opportunities.

github.com/LeeHolmes/ai

Screen shot of using an ai.exe tool from the command line to ask questions, as well as process a text file of a meeting transcript.
2024-11-20

A quick tour of new functions in BARK that support Azure Key Vault tradecraft research, including a walk-through of how an adversary may chain these functions together as part of an attack path: posts.specterops.io/azure-key-

2024-11-19

I couldn't find any PowerShell examples of encrypting/decrypting data w/ Azure Key Vault keys, so I made some:

Protect-StringWithAzureKeyVaultKey
Unprotect-StringWithAzureKeyVaultKey

github.com/BloodHoundAD/BARK/c

Explanatory blog post coming soon.

Andy Robbins boosted:
Lee Holmes :donor:Lee_Holmes@infosec.exchange
2024-11-12
2024-11-09

How's it going, y'all?

Andy Robbins boosted:
2024-07-31

Fediverse, due to my wife's thyroid cancer returning we are relocating to Seattle (from Illinois) -- where we can receive familial support and she can get treatment.

To that end, I'm looking for #infosec jobs in the area, but I'm looking to step back from what I've been doing so I have a bit more flexibility to help her and our son. So, hybrid or even full remote, but probably not a senior level position.

I've been consulting and that's been good, but it's too unsteady and too much work on unknown schedules to continue while she is undergoing treatment. I'll also be applying through standard channels, but I hope someone here can lend a hand.

#getfedihired

2024-07-31

@noodlemancer Hi Dan. We are a DC/Seattle-based infosec consulting/training/product firm. We are not "full remote" but we are much closer to "full remote" than we are hybrid. We have excellent benefits including extremely good health insurance. We have several positions open right now: job-boards.greenhouse.io/spect

2024-02-08
2023-08-05

We are releasing BloodHound CE on Tuesday August 8.

This 30 second video shows you the *dramatic* performance improvements over Legacy BloodHound: youtube.com/watch?v=bqMmYi7jaM

2023-08-02

Today: join me and Rohan Vazarkar in the BloodHound Slack from 11AM to Noon Pacific for an AMA regarding the upcoming BloodHound CE release.

Not in the BloodHound Slack yet? Get your invite here: ghst.ly/BHSlack

2023-07-05

08.08.23

2023-02-13

Went on a little hike yesterday in the Middle Fork Snoqualmie River valley. This is from the Oxbow Loop Trail:

2023-01-20

I love this write-up by Kevin Mwanjumwa (twitter.com/sofblocks) on using BloodHound for Azure attack path analysis: sofblocks.github.io/azure-atta

Andy Robbins boosted:
2023-01-10

South Korea's browser extension problem (@WPalant), Prox-Ez, Sam Curry's car hacks, Azure privesc via Certificate-Based Authentication (@wald0), tons of direct syscall techniques, and more!

blog.badsectorlabs.com/last-we

2023-01-04

@Lee_Holmes We used to use this trick to get internal IPs, internal hostnames, and those hostnames would often include internal Active Directory domain names as well. Great recon method for getting internal network/AD info with literally just e-mail.

2022-12-30

My favorite items of 2022:

Favorite overall resource: The Hacker Recipes by Charlie Bromberg - thehacker.recipes/. Amazingly in-depth guides full of explanations, examples, and references.

Favorite blogger: Lina Lau (@inversecos). Lina's blogs are among the best in the industry, full of extremely valuable information for defenders and attackers alike. Lina's blog here: inversecos.com/

Favorite defense-centric blog post: The Defender’s Guide to the Windows Registry by Luke Paine and Jonathan Johnson: medium.com/p/febe241abc75

Favorite offense-centric blog post: Stealing and faking Azure AD device identities by Dr. Nestori Syynimaa (@DrAzureAD): aadinternals.com/post/deviceid

2022-12-29

@Neuromancer The blog post is correct, I made an error in the slide deck.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst