AD - Post-Compromise Enumeration
Last updated
Was this helpful?
Last updated
Was this helpful?
➡️ - Active Directory information dumper via LDAP account
value targets
domain users
other types of access
descriptions
Domain Admins, Enterprise Admins, Computers, etc
Run BloodHound and login with neo4j
user
Collect the data by using an ingestor
Back to BloodHound interface, import all the json
files via Upload data
Check interesting data via Node Info and Analysis
Run it from SPIDERMAN
VM for example
Run a Healthcheck analysis
Open the ad_hc_marvel.local.html
file and check for the domain risk score and results
➡️ - uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment
Open the link and setup with user neo4j
:neo4jbh
➡️ - BloodHoundAD report engine
➡️ - tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework
➡️ - free attack path discovery tool, natively compatible with Active Directory, that helps cybersecurity defensive teams quickly prioritize high-risk misconfigurations that could represent opportunities for attackers to gain privileged domain access
➡️ - standalone utility that queries the Active Directory and Entra ID environment and performs a set of tests against many aspects of Active Directory’s security posture, including AD delegation, account security, AD infrastructure security, Group Policy security, and Kerberos security