Attacking Active Directory - Bloodhound

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 พ.ย. 2024

ความคิดเห็น • 56

  • @InfiniteLogins
    @InfiniteLogins 4 ปีที่แล้ว +27

    I use Bloodhound on every internal assessment, but I never knew about the ability to run collectors remotely with Python. Thanks for sharing!

    • @c0nd4
      @c0nd4  4 ปีที่แล้ว

      Awesome! Thank you for the support!

    • @archersterling4044
      @archersterling4044 3 ปีที่แล้ว

      Supposedly sharphound.exe is a more stable and reliable collector?

  • @zunicalmir
    @zunicalmir ปีที่แล้ว +2

    Its amazing how u explain it, its easy to soak with just one run...thank you

  • @karthikeyanrajasekar7119
    @karthikeyanrajasekar7119 3 ปีที่แล้ว +10

    Please make more of these videos on Active Directory. Absolutely loved this one !

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว +1

      I do plan on it 🙂

  • @b-rent4733
    @b-rent4733 2 ปีที่แล้ว +1

    Thanks Conda! This was key to using bloodhound without having local access to the domain.

  • @ns-yz1hj
    @ns-yz1hj 3 ปีที่แล้ว +3

    Keep the AD videos coming man. Finding good AD guides is hard. Love your videos!

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Thank you!

  • @colinrogers9927
    @colinrogers9927 ปีที่แล้ว +1

    This is a great explanation. Good work

    • @c0nd4
      @c0nd4  ปีที่แล้ว

      Thank you!

  • @Jesse_Johnson
    @Jesse_Johnson 8 หลายเดือนก่อน

    I am getting this job. Thank you.

  • @nilangaperera9649
    @nilangaperera9649 3 ปีที่แล้ว +1

    Thanks heaps, for making this great video demonstration.

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Appreciate the support 👍

  • @balanceandjustice777
    @balanceandjustice777 3 ปีที่แล้ว +1

    Great video! Thank you so much!!

  • @WizardKing24
    @WizardKing24 2 ปีที่แล้ว +1

    Wow, very great video! I learned a lot, for example I didn't know that you can collect the data with Python. Thanks for all the tips in Bloodhound and the BadBlood you mentioned in another comment, I'll definitely check it out too! Thanks a lot!

    • @c0nd4
      @c0nd4  2 ปีที่แล้ว

      Glad you enjoyed the video!

  • @pcap_pirate960
    @pcap_pirate960 2 ปีที่แล้ว

    Great explanation!

  • @behnamahmadi6482
    @behnamahmadi6482 3 ปีที่แล้ว +1

    thank u so much for this awesome tutorial video.

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      No problem! Glad you enjoyed it

  • @sargondinkha8492
    @sargondinkha8492 2 ปีที่แล้ว +1

    Great tutorial!

    • @c0nd4
      @c0nd4  2 ปีที่แล้ว

      Thank you!

  • @sul3y
    @sul3y 3 ปีที่แล้ว +1

    Thank you

  • @Arummekarlayung0706
    @Arummekarlayung0706 3 ปีที่แล้ว +1

    very clear explanation :)

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Thank you!

  • @MrMrabaunza
    @MrMrabaunza 3 ปีที่แล้ว +1

    awesome video...it was very informative. subbed.

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว +1

      Thank you 😁

  • @ca7986
    @ca7986 3 ปีที่แล้ว +1

    You are amazing dude 👌

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Thanks, I appreciate the support!

  • @quanghuyang2822
    @quanghuyang2822 ปีที่แล้ว

    Hi, I'm new to the world of security administration, and I was hoping to get some guidance from someone with your expertise. Do you have any advice on mapping out a career path in this area?

  • @danell12345
    @danell12345 3 ปีที่แล้ว +2

    Good job - one quick question I had was how did you create your user and group infrastructure? Did you do this manually adding random users assinging them to groups/roles or some kind of script? Obvs this is a testing environment.

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว +2

      I used BadBlood which you can find here. github.com/davidprowe/BadBlood
      I then assigned a few group permissions manually to showcase some more complex attack paths with Bloodhound

    • @danell12345
      @danell12345 3 ปีที่แล้ว +1

      @@c0nd4 will check it out - TY!

  • @shift3y
    @shift3y 3 ปีที่แล้ว +1

    Can the initial bloodhound query to AD be detected ? This would appear as a large LDAP query, is that right?

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Oh yeah, Bloodhound can be very noisy and is typically caught. They have some stealth settings but effectiveness will vary.

    • @shift3y
      @shift3y 3 ปีที่แล้ว +1

      @@c0nd4 Thanks! Great channel, subscribed!

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Appreciate it 😃

  • @chiranjeevinaidu3660
    @chiranjeevinaidu3660 3 ปีที่แล้ว

    Hello
    I wanted to ask if we can make bloodhound portable for windows 10 for better use

  • @iakashx
    @iakashx 4 ปีที่แล้ว +2

    Hi. Is this allowd for OSCP exam.??
    And thank you for this video.
    Happy Thanksgiving 🤗

    • @c0nd4
      @c0nd4  4 ปีที่แล้ว +1

      Hey! Bloodhound should be allowed on the exam, but I'm not sure if you would need it. Glad you enjoyed the video, and Happy Thanksgiving!

    • @pentestsky
      @pentestsky 4 ปีที่แล้ว +1

      @@c0nd4 no bloodhound in oscp

    • @KaliLinuxIn
      @KaliLinuxIn 3 ปีที่แล้ว

      Kuch Bhi.....

    • @archersterling4044
      @archersterling4044 3 ปีที่แล้ว

      @@c0nd4 OSCP literally has no environment where bloodhound should be relevant.

  • @archersterling4044
    @archersterling4044 3 ปีที่แล้ว

    Hey bro how did you automate the domain configurations?
    I need to build a lab environment for work related research.

  • @pentestsky
    @pentestsky 4 ปีที่แล้ว +1

    nice keep going sorry for the late view

    • @c0nd4
      @c0nd4  4 ปีที่แล้ว

      Thank you for the constant support!

  • @haxwizard2035
    @haxwizard2035 2 หลายเดือนก่อน +1

    more ad videos please

  • @jakeedmondson5288
    @jakeedmondson5288 3 ปีที่แล้ว

    I was able to get everything installed properly but when trying to run bloodhound-python I just receive an error. I may have not been in the proper directory which I don't see in your tutorial. Any help is appreciated. Thanks.

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      What's the error? Can't really offer help without knowing the error

    • @jakeedmondson5288
      @jakeedmondson5288 3 ปีที่แล้ว

      @@c0nd4 When opening a terminal window I am not sure where to go from there. I see from your video you are in a Bloodhound directory. Did you just create that or was that created from the install? I only see the Bloodhound folder under lib. I am almost certain everything installed properly though.

  • @LeonCheater13
    @LeonCheater13 3 ปีที่แล้ว

    Hi nice video :) How to archive the GenericAll permission like you did? How to I need to configure my "Account managers" group to have GenericAll over Domain Admins? Thanks in advance

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว +1

      The term AD uses for this is "Delegating control". Knowing the terminology helps find good resources on Google 😃 This article should help you do what you need. Good luck!
      www.beyondtrust.com/docs/ad-bridge/how-to/delegate-domain-join-privileges/how-to-delegate-control.htm

    • @LeonCheater13
      @LeonCheater13 3 ปีที่แล้ว +1

      @@c0nd4 Wow thank you very much :)

  • @8080VB
    @8080VB 2 ปีที่แล้ว

    I dont understand , how did you generated the loot.zip file?

  • @gabrielalonsonicolasundurr1751
    @gabrielalonsonicolasundurr1751 3 ปีที่แล้ว

    Puedes dejar el video con subtitulos al español ? Por favor.

  • @trejohnson7677
    @trejohnson7677 3 ปีที่แล้ว

    its kind of ugly though.