Transcript
A (0:00)
Foreign. This is Catalina Campano and this is another Risky Business sponsor interview. Today our guest is Jared Atkinson, the CEO of Spectre Apps, the company behind the infamous Bloodhound, a security tool that scans complex networks, detects, and then visualizes possible attacker paths. Let's start with what's new. This July, you released Bloodhound with a new feature called Open Graph, or at least you rolled it out through the Community Edition. Can you tell us what it is?
B (0:31)
Yeah, sure. So Bloodhound originally, as a lot of the listeners are probably aware, started off with Active Directory, and then we added Intra id. One of the things that we. I'm in charge of the research team, and one of the things that we're responsible for is thinking about how can we expand the graph to include new platforms, new attack paths, new edges, that type of thing. But we found that it was quite an engineering challenge to constantly be adding new things to the graph, and it required, like actual developers to make those changes. And so we created a new capability in Bloodhound called Bloodhound Open Graph. And the goal was to have kind of an open standard that allows people to integrate new attack paths into, into the Bloodhound graph, kind of in a very easy, simple to use way. And so there's a JSON definition that says this is what a payload is supposed to look like, and you can, you can expand the graph to anything. And so we kind of started off with, I think there was five different, what we call open graph extensions, one for GitHub Enterprise. And so basically, how do you show attack paths from a GitHub user to, for instance, a GitHub repository? Who has write access to a GitHub repository? For instance, we looked at 1Password. And so at SpectreOps, we use 1Password to kind of manage a lot of passwords. And we thought, oh, it'd be interesting to see kind of like what that looks like, what users have access to, what vaults in there for what logon accounts, and things of that nature. And so we were able to kind of map that out. A kind of cool stat, I guess, is that we were able to take one password, which is, it's a simple model, kind of in its nature as compared to, say, Intra, which is just gigantic and sprawling and there's all kinds of different things. And we were able to develop kind of research the access control model for 1Password, understand how to use the different tooling to hit the API and things of that nature, and build the graph into Bloodhound in two and a half hours. So that's the speed at which Bloodhound Open Graph kind of allows people to add new information into the graph.
A (2:28)
So this was kind of a necessary update. Like, companies are not just Microsoft gear anymore. It's a mix of all kinds of enterprise systems.
B (2:36)
