Bloodhound
Bloodhound Usage

Linux
Rusthound
The most opsec
NXC
Bloodhound.py
To get all data in Bloodhound, use SharpHond.exe - Exegol compatible version https://github.com/BloodHoundAD/SharpHound/releases/download/v1.0.4/SharpHound-v1.0.4.zip
Bloodhound.py don't get all data, probably because of DNS resolution
With password
Timeout errors - add dns-tcp
Even better
With Kerberos (ccache)
LDAPSearch - Avoid Detection

JSON files can be ingest int o Bloodhound and we now have ACLs
Can also see:
Windows
Sharphound.exe
For Exegol compatible version: https://github.com/BloodHoundAD/SharpHound/releases/download/v1.0.4/SharpHound-v1.0.4.zip
Sharphound.ps1
SOAPHound
ShadowHound
2 options: ADWS or LDAP

ADExplorer64 - Avoid Detection
ADExplorer64.exe is a sysinternal signed binary
C:\Windows\Temp\ is a default AppLocker Exclusion Path

File -> Create a Snapshot


Parse the snapshot to ingest it in Bloodhound
Change self.preprocessCached() by self.preprocess()


Can now be used in Bloodhound
It doesn't include ACL datas
To get ACL datas see LDAPSearch
Run Bloodhound

Then upload zip file generate from Sharphound or bloodhound-python
Bloodhound-quickwin
AD Miner
Autobloody
Bloodhound Query Library
Interesting Book
Interesting BooksPentesting Active Directory and Windows-based Infrastructure Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec considerations
Infrastructure Attack Strategies for Ethical Hacking Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory.
RTFM: Red Team Field Manual v2 A quick reference when there is no time to scour the Internet for that perfect command
Red Team Development and Operations: A practical guide The authors have moved beyond SANS training and use this book to detail red team operations in a practical guide.
Cybersecurity Attacks – Red Team Strategies A practical guide to building a penetration testing program having homefield advantage
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated

