TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

NetSPI

Walking Through an Attack Path with ForceHound

Weylon Solis · 2026-04-17 · Read original ↗

ATT&CK techniques detected

5 predictions
T1525Implant Internal Image
92%
"##sapp ] - > ( app : sf _ connectedapp ) return p, r, app limit 10 now combine that with the identity graph to find which users can reach a specific app through their profile : match p = ( u : sf _ user ) - [ : hasprofile ] - > ( prof : sf _ profile ) - [ : canaccessapp ] - > ( a…"
T1525Implant Internal Image
74%
"set three years ago probably didn ’ t consider it a path to full org compromise. scenario 2 : connected app exposure via implicit access in the connected app post, i walked through a scenario where an attacker used a malicious connected app to pivot from oauth consent to aws cred…"
T1552.005Cloud Instance Metadata API
56%
"to custom metadata types containing hardcoded aws credentials, you ’ ve just mapped the exact blast radius i described in that post. with forcehound and bloodhound, you can see it before an attacker exploits it. more useful cypher queries once the graph is in bloodhound, the ques…"
T1525Implant Internal Image
54%
"to custom metadata types containing hardcoded aws credentials, you ’ ve just mapped the exact blast radius i described in that post. with forcehound and bloodhound, you can see it before an attacker exploits it. more useful cypher queries once the graph is in bloodhound, the ques…"
T1098Account Manipulation
50%
"##data, this query returns the path. but the more interesting case is when the path isn ’ t direct. what if the user doesn ’ t have modifyalldata, but they do have manageusers or assignpermissionsets? match p = ( u : sf _ user ) - [ : hasprofile | haspermissionset ] - > ( ps ) - …"

Summary

In Part 2 of the series, Weylon covers how to use ForceHound to visualize Salesforce attack paths in BloodHound CE, identify transitive privilege escalation, and legacy Connected App exposures.

The post Walking Through an Attack Path with ForceHound appeared first on NetSPI.