Transcript
A (0:03)
Hello, everyone, this is Tom Uren. I'm here with another Risky Business News sponsor interview. Today I have with me Justin Koehler, who is the Chief product officer of SpectreOps, which maintains Bloodhound, which does attack path management. So, g', day, Justin. How are you?
B (0:20)
Hey, awesome. Great to be here.
A (0:22)
So I've always found our conversations over the years now I've been at Risky Business to be very fascinating because the underlying dynamic is that people have computer systems, they need to manage them, but the complexity of how to manage permissions just gets to be very, very difficult to manage. In fact, my understanding now is it's impossible to manage if you're just people, even when you're following best practice.
B (0:49)
Yes.
A (0:50)
And so the, the trajectory I've seen is that Bloodhound, when I first started, was it let you see the ways that people could take advantage of the way systems were set up to do bad things by gaining privileges they shouldn't have. And that journey has been Bloodhound does more and more things. It starts to fix problems instead of just identifying them. And you're expanding into different areas. And so I'm wondering what you've kind of what you've been doing and what you've learned as you've gone along.
B (1:24)
Yeah, yeah. The first thing is our work in Open Graph. So people historically know Bloodhound as a Microsoft centric tool. So way back in the day, I phish a user. How can I take that initial identity in Active Directory and turn it into a very highly privileged thing like controller or domain controller or Domain admin? We then expanded to Azure, but we always wanted to go far beyond the same problem that exists in Active Directory exists in everywhere that you can assign privilege to an identity or a resource. And often it's not what I have access to as my user account, but how does my user account chain into something else? Or how does a service account, or you call it non human identity, whatever you want. How do we chain together identities to have more of an impact in the environment? That's what we do on the red team side at SpectreOps, and that's what real attackers do. So can we see that visibility and then do something about it over the past six months? So back in August, we released this feature called Open Graph, which allowed pen testers and researchers to start to build out new platforms within Bloodhound. We actually have over 30 today. This includes community contributions like AWS, GCP, I mean, you name it, there's quite a lot of them in there. And we're really excited about the other enterprise support that we're bringing to those.
