How To Enumerate Active Directory with BloodHound -- (Without Being Overwhelmed!)

Поділитися
Вставка
  • Опубліковано 25 лис 2024
  • BloodHound leverages graph theory to uncover hidden and often unintended relationships within Active Directory, Entra, and Azure environments. Attackers use BloodHound to quickly identify complex attack paths that would otherwise be difficult to detect, while defenders can utilize it to pinpoint and eliminate those same vulnerabilities.
    In this video, I provide a detailed overview of the following:
    Installing BloodHound
    Using Python to get the "loot" from the target.
    Analyzing attack paths in BloodHound.
    I also share a custom script to help with getting the information from the target system.
    Enjoy!
    Script: github.com/Ten...
    ----------
    This content is intended for educational purposes only. All demonstrations and techniques shown are designed to teach ethical hacking and improve cybersecurity. Any use of the information provided in these videos is done at your own risk and should be used responsibly. Unauthorized hacking, illegal activities, or violations of privacy are not endorsed or encouraged. Always ensure you have proper authorization before attempting any security testing or hacking.
  • Наука та технологія

КОМЕНТАРІ • 25

  • @gashone
    @gashone 21 день тому

    amazin video and very useful for certifications like PNPT and CPTS

  • @kenzyflash
    @kenzyflash Місяць тому +1

    The best video on how to use bloodhound easily. Thanks man for sharing this content with us!

  • @tyler49123
    @tyler49123 Місяць тому

    great video, waiting to get to the win-rm module in htb academy!

  • @noamrozen7891
    @noamrozen7891 Місяць тому +1

    Nice video, think about showing how to use more complex bloodhound queries, And one problem in the comunity edition is if you ended your testing on this domain and now want to upload new data from other domain you cant remove that data that already exists and you have to delete the docker container and install it again every time, thats really anoying

    • @TylerRamsbey
      @TylerRamsbey  Місяць тому

      Yeah, that's true

    • @JoakimBB
      @JoakimBB Місяць тому

      * For Bash compatible shells: `docker volume rm $(docker volume ls -q | grep neo4j-data)`
      * For PowerShell: `docker volume rm @(docker volume ls -q | Select-String neo4j-data)`

  • @muhammadtayab
    @muhammadtayab Місяць тому

    this is amazing thanks dude .......!!!!

  • @dongelhouse
    @dongelhouse Місяць тому

    Great video again.
    How can you run the script to collect if you are in a different IP range?

    • @dongelhouse
      @dongelhouse 28 днів тому

      Hope you can answer my question.

    • @dongelhouse
      @dongelhouse 28 днів тому

      ​ @TylerRamsbey Hope you can answer my question. Or put it in a new video :D I watch them all

  • @ShaunDan
    @ShaunDan Місяць тому

    I still use the old version (old school) start the neo4j then run the bloodhound do you recommend the new one over old version what are your thoughts on this

  • @MrZeblood
    @MrZeblood Місяць тому

    Hey, thanks for the content. Would it be possible to get a video with more in-depth focus on Bloodhound analysis ? Basically, if there is no obvious path from the compromised user to domain admins group, where to look for ? I suppose few Cypher queries are very useful. Which ones are you using, in practise ? Cheers

    • @TylerRamsbey
      @TylerRamsbey  Місяць тому

      Yes, I'll plan for something in the near future :)

    • @MrZeblood
      @MrZeblood Місяць тому

      @@TylerRamsbey Great ! Thank you

    • @dongelhouse
      @dongelhouse 28 днів тому

      ​@@TylerRamsbey How can you run the script to collect if you are in a different IP range?

  • @eshasultan2230
    @eshasultan2230 3 дні тому

    your offensive security filess are not available

  • @anputhegod246
    @anputhegod246 Місяць тому

    Tyler can you use this on the OSCP exam???

    • @bradyjmcl
      @bradyjmcl 25 днів тому

      Yes, BloodHound is crucial for OSCP! It doesn't do any automated exploitation, which is the key. Use it and prosper!

  • @sabyasachisahoo8975
    @sabyasachisahoo8975 Місяць тому +1

    OLd VErsion is legend ,new verion is very laggy

    • @TylerRamsbey
      @TylerRamsbey  Місяць тому

      I personally haven't noticed any lag with the new version

    • @selfspider7644
      @selfspider7644 Місяць тому

      True.. in windows

    • @jaysonjoy6467
      @jaysonjoy6467 Місяць тому

      Update your PC configuration.

  • @viduraranathunga6000
    @viduraranathunga6000 Місяць тому

    wow really informative .
    is there a way to contact you?