Hacking with Bloodhound: Map Your Environment

Поділитися
Вставка
  • Опубліковано 8 лис 2023
  • jh.live/bloodhound || Map Attack Paths in Active Directory and Azure with the FREE and open-source BloodHound Community Edition, or defend your environment with Bloodhound Enterprise! jh.live/bloodhound
    Free Cybersecurity Education and Ethical Hacking
    🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

КОМЕНТАРІ • 77

  • @mohinparamasivam5189
    @mohinparamasivam5189 6 місяців тому +19

    One feature they missed in the CE edition is “mark user as owned” it’s super beneficial to find attack paths as well 😢

  • @JackOfAllThreatsMasterOfNone
    @JackOfAllThreatsMasterOfNone 6 місяців тому +7

    And BHE marketing campaign should be: let defenders think in graphs too :) really cool

  • @user-fy2qm4ql9o
    @user-fy2qm4ql9o 6 місяців тому +5

    Hi brother. Wanted to thank you,6 months ago i discovered this world thanks to your chanel. I just love it and since then i learn everyday. Props, take care of you and keep going with the good stuff!

    • @djnikx1
      @djnikx1 6 місяців тому

      What things did you learn??

    • @user-fy2qm4ql9o
      @user-fy2qm4ql9o 6 місяців тому

      @@djnikx1 pentest, playing ctf's etc.

  • @MafinPhoenix
    @MafinPhoenix 6 місяців тому +2

    Great content. Used Bloodhound in the past. But the upgrades look awesome!

  • @fernandomochizuki6287
    @fernandomochizuki6287 6 місяців тому

    Amazing content John! Thank you very much for sharing.

  • @UNotSeeMe2024
    @UNotSeeMe2024 6 місяців тому +1

    Thank you so much John for this! So much learnt and I use this tool myself now to a higher degree

  • @JoshuaSmithit
    @JoshuaSmithit 6 місяців тому +1

    Sick! Thanks for the tool upgrade!

  • @Manavetri
    @Manavetri 6 місяців тому

    The most useful video I have seen in many months! INCREDIBLE

  • @ThatNateGuy
    @ThatNateGuy 6 місяців тому +2

    This is great content that taught me something!
    Also, PowerShell rules.

  • @0xAnomaly
    @0xAnomaly 6 місяців тому +1

    The problem is collection method where sharphound is not gonna cut it, cos its super loud out of the box. One has to query AD parse and structure data to even think about using bloodhound

  • @alvesbruno4900
    @alvesbruno4900 6 місяців тому +1

    You guys are fire right now.💥🤯

  • @smartsalmon1
    @smartsalmon1 6 місяців тому +24

    I got a ton of pushback about using this in prod on a blue team. I dont think its justified after talking to my offensive friends. There needs to be more awareness about this being okay to use bc somehow im the only one on my team that didnt believe it would destroy our AD environment.

    • @VJ-lu2he
      @VJ-lu2he 6 місяців тому +4

      I'd say they are ganging up on you knowing they would need to give a chunk of their work done by BH. If one is literate and knows how to read I don't see how he would mess up AD?

    • @smartsalmon1
      @smartsalmon1 6 місяців тому +5

      @@VJ-lu2he I think half the team didn't know what it even was and one guy who definitely knew better fear mongered it and everyone freaked out lol. But you may be on to something with the one guy who fear mongered bc he does a lot of AD type stuff.

    • @secops3531
      @secops3531 6 місяців тому +5

      IMO there's no reason for any pushback by a blue team.
      Either they're scared of security flaws being uncovered that they've configured unknowingly or they simply don't understand its usage to a full extent

    • @exithe
      @exithe 5 місяців тому

      I work in the field and its more than likely because it will fire alerts when seen as a file. So most ignorant people think its some kind of malware... which they just need to know its firing an alert simply based off a name or hash "bloodhound.exe" or some itteration and that's it! Not because its malware, but they don't know that as they are ignorant. Bloodhound simply uses netsessionenum command to ask questions not change shit.

  • @omphemetsemokene4338
    @omphemetsemokene4338 6 місяців тому +1

    Ladies and gentleman ,skiddies and trolls ...give it to our leader....skid army ..........."JHammond"....i love your content bro...all the way from Botswana

    • @jjann54321
      @jjann54321 6 місяців тому

      Nah, I think NetworkChuck and David Bombal contribute WAAAAAYYYY more to the *skiddie army.* At least John knows what he's doing and when he creates a video that's "too much" (i.e. his HoneyBadger video) he takes it down.

  • @johnathondupuis1301
    @johnathondupuis1301 6 місяців тому

    This is pretty mind blowing. Legit audit tool now.

  • @Abduselam.m
    @Abduselam.m 6 місяців тому

    ❤ your videos are very important

  • @danushkastanley1746
    @danushkastanley1746 6 місяців тому +1

    Love this man loooooove this ❤

  • @rogerioabreu3081
    @rogerioabreu3081 6 місяців тому

    specterops is amazing!

  • @robyee3325
    @robyee3325 6 місяців тому +1

    Can somebody inexperienced use bloodhound on their own network, then learn how to protect against each vulnerability that pops up?

  • @georgehammond867
    @georgehammond867 6 місяців тому

    great work.

  • @zzsql
    @zzsql 5 місяців тому

    If AD traffic is encrypted, how does Bloodhound develop graphical Attack Paths?
    Does it actively query devices, sniff traffic and log it all into the path map?

  • @DarrenEley
    @DarrenEley 6 місяців тому

    All you can really say is... WOW!

  • @TehStoni
    @TehStoni 6 місяців тому +3

    is there a way to mark users as owned and find paths based off of that user, like that was in 'old' bloodhound?

    • @JustinKohler10
      @JustinKohler10 6 місяців тому

      it's coming very soon

    • @TehStoni
      @TehStoni 6 місяців тому

      @@JustinKohler10 if i could heart your comment i would

  • @HxN0n3
    @HxN0n3 6 місяців тому

    Thank you.

  • @EricTheButcher
    @EricTheButcher 6 місяців тому +2

    I apologies I’m still a script kitten 😅 currently building my own educational testing environment. This would be good to learn fundamentals of attack? Or am I wrong in that case

    • @JustinKohler10
      @JustinKohler10 6 місяців тому +1

      You are absolutely right. Your educational testing environment (either home developed or there are a lot of training options available for fair prices) should incorporate AD and BloodHound is the first step in understanding the connections and how you can abuse them.

  • @squid13579
    @squid13579 6 місяців тому +1

    Next ? Sn1per ? 😂
    Informative video 🔥👏

  • @MAX-nv6yj
    @MAX-nv6yj 6 місяців тому

    I will watch it till the end

  • @robyee3325
    @robyee3325 6 місяців тому

    Is there something similar that not only shows you your network’s vulnerabilities but can also tell you what/how to secure?

    • @JustinKohler10
      @JustinKohler10 6 місяців тому +1

      That's BloodHound Enterprise

    • @robyee3325
      @robyee3325 6 місяців тому

      @@JustinKohler10 thanks

  • @ADH-DIY
    @ADH-DIY 6 місяців тому

    The dude at the bottom has the "Rami Malek" eye movements and i cant stop relating

  • @blaise-of-glory
    @blaise-of-glory 6 місяців тому +2

    > Powershell
    > Best language
    You can only pick one.

    • @robbinsandy
      @robbinsandy 6 місяців тому +4

      I said what I said :p

    • @ndog315
      @ndog315 6 місяців тому

      ​@@robbinsandy110% dis is da way

  • @drasticwarrior5357
    @drasticwarrior5357 6 місяців тому

    for some reason can't find the wiz video, anyone know if its still up?

  • @user-ye3pq6zv5z
    @user-ye3pq6zv5z 6 місяців тому

    every time i drag and drop my sharphound outputs, it doesn't go to the database instead it simply gets downloaded back. am i doing it wrong? do i have to upload files via manual ingest?

    • @JustinKohler10
      @JustinKohler10 6 місяців тому

      You need to click the file upload modal before you drag your file over. Let me know if you still have issues

  • @SECYBERSAFE
    @SECYBERSAFE 6 місяців тому +1

    😊Another gem

  • @phillydee3592
    @phillydee3592 6 місяців тому +1

    So even before starting an AD pentest,it's better to run bloodhound just to know your path that you should take..

  • @user-td4pf6rr2t
    @user-td4pf6rr2t 3 місяці тому

    30:27 My only criticism in this industry is that professionals seem 2 terms to've keyed. "Standing on the shoulders of giants" and "_ " _ ALL the _". independent they're a very rich history artifacts. Combined its like "HOW DO I DO ALL THE THINGS FROM THIS GIANTS SHOULDER"

  • @digitalcynicism
    @digitalcynicism 6 місяців тому +1

    Running to go download

  • @74mada
    @74mada 6 місяців тому

    BloodCat is coming...

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 6 місяців тому

    Early crew. :3

  • @charlesmarseille123
    @charlesmarseille123 6 місяців тому

    feels good to hear john natural and not scripty. love your work man, but lately it feels robotic and hypee.

    • @jjann54321
      @jjann54321 6 місяців тому +1

      I agree 100%. I can't remember the last time John did a completely unsponsored video, I do miss those days. I do understand the "business" of his YT channel and now that he's fast approaching 1 million subs he's getting more sponsored opportunities and if he's going to be creating vids at 1am he mine-as-well make as much money as possible from them. I will forever appreciate John's giving back to (and building) the community, both on the blue and red team sides of the house. But yes, I think the unsponsored 40 min deep dive/analysis of malware using open-source tools and processes videos are long gone. Good for John on his newfound success, it's long overdue.

  • @Head2Tow
    @Head2Tow 6 місяців тому

    How noisy is this to CrowdStrike and Huntress?

    • @gamerscodex5454
      @gamerscodex5454 6 місяців тому

      curious about this too, will Crowdstrike notice it?

    • @EinfachNils02
      @EinfachNils02 6 місяців тому +1

      MS Defender for endpoint edr/xdr does detect it, i think crowdstrike would too

    • @JustinKohler10
      @JustinKohler10 6 місяців тому

      BloodHound's default enumeration has been fingerprinted by most EDR/AV products. You can get around this in a couple ways depending on the product and it's always a bit of a cat and mouse game. If you're running it internally at your organization for blue-team purposes, allow-listing is your best bet to capturing the required data @@gamerscodex5454

  • @stiffler297
    @stiffler297 6 місяців тому

    I guess I'm not as smart. What terminal do I open to install the yml file?

  • @user-ji6lz1vh8g
    @user-ji6lz1vh8g 6 місяців тому +1

    i hate docker, please do things with opensource software. Docker uses political language to say they are opensource. but they are not. please forgo proprietary bs.

    • @CodyDBentley
      @CodyDBentley 5 місяців тому

      We do want to move to podman in the future

  • @variblex
    @variblex 6 місяців тому

    Love me some ps

  • @ABHILIVE300
    @ABHILIVE300 6 місяців тому

    I will translate your video into another language and upload it on UA-cam. I will not give you any commission but I will give you 50% of it.

  • @user-vb6nz1sq4c
    @user-vb6nz1sq4c 6 місяців тому +4

    how to hack other public ip address only i have that error can you help me😊😊

    • @thedarkdiamond1207
      @thedarkdiamond1207 6 місяців тому +4

      Script kiddie. A youtube comment section isn't the right place for this

    • @buddinglearner7085
      @buddinglearner7085 6 місяців тому

      true@@thedarkdiamond1207

    • @user-ji6lz1vh8g
      @user-ji6lz1vh8g 6 місяців тому

      clown

    • @abdocool-hz8is
      @abdocool-hz8is 6 місяців тому

      ​@@thedarkdiamond1207so where to get in the hacking community? Stopped hacking since WPAs were announced uncrackable

    • @user-vb6nz1sq4c
      @user-vb6nz1sq4c 6 місяців тому

      @@thedarkdiamond1207 can you help me

  • @m_peter1514
    @m_peter1514 6 місяців тому

    Free Palestine ❤

    • @maalikserebryakov
      @maalikserebryakov 6 місяців тому

      It is free take 💪🏾😈.

    • @atraxotoxin3840
      @atraxotoxin3840 6 місяців тому

      Regardless of your religious beliefs or political views was it ok for hamas to come in and attack hundreds if not thousands of people that day. Killing and injuring innocent people having a good time and minding there own business. Iives are lives. We all come from the same source no matter what you call the so called God it's the same being. There is no my God is better than your God it's the same entity. So free all people. It's like black lives matter. No black lives don't matter. All lives matter. Period.

    • @atraxotoxin3840
      @atraxotoxin3840 6 місяців тому

      And plus it's absolutely ridiculous your saying free Palestine in this channel. When this channel is a technical channel. So go elsewhere for that crap.