Attacking Active Directory is a great way to achieve control of an environment, letting you access the data, and act on your objectives. BloodHound lets you visualize the shortest path to get to where you need to be.
Understanding the relationship between thousands of Active Directory objects can be difficult. Users are members of groups, which can be nested in other groups, and linked to thousands of permissions. In this course, Discovery with BloodHound, you will gain the ability to use BloodHound to quickly find the shortest path to compromise systems in an Active Directory environment.
First, you will learn how to install BloodHound. Next, you will discover how to use SharpHound to gather data from AD. Finally, you will explore how to ingest and visualize that data, finding paths between objects and the ultimate goal, Domain Admin access. When you are finished with this course, you will have the skills and knowledge of BloodHound needed to start using it to attack AD, or to understand how to better defend it.
Course Overview Welcome to Pluralsight and this Red Team tools course featuring BloodHound, the open source discovery tool developed and maintained by @_wald0, @CptJesus, and @harmj0y. Bloodhound is a tool that leverages the power of graphs to let you visualize a domain. With it, as an attacker, you'll be able to find paths to your objectives. How do I get to domain admin from the computer I just compromised? Which user account should I compromise next? These are questions that BloodHound will help you answer with ease. In short, it makes me feel superhuman when assessing an Active Directory domain. Bloodhounds are dogs bred for hunting and tracking people. BloodHound for AD is essentially the same, but for Active Directory. Come and join me as we discover BloodHound and attack a demo Active Directory with it.