Post

Part 3 - Domain Enumeration with Bloodhound

Tujuan

  • Post compromise enumeration

Prasyarat

  • Memiliki kredensial user domain

Tools


Enumerasi AD dengan Bloodhound

Remote BloodHound

Python BloodHound Repository atau install pip3 install bloodhound.

1
2
# remote
➜ bloodhound-python -u <user> -p <password> -ns <DC Ip> -d <Domain> -c All

On Site BloodHound

1
2
3
4
5
6
7
8
# exe binary
PS> .\SharpHound.exe -c All
PS> .\SharpHound.exe -c All --ldapusername <user> --ldappassword <password> --domain <domain> 

# powershell
PS> . .\SharpHound.ps1
PS> Invoke-BloodHound -CollectionMethod All
PS> Invoke-BloodHound -CollectionMethod All -LdapUser <user> -LdapPass <password> -domain <domain>

Artikel Tips Membaca Bloodhound

This post is licensed under CC BY 4.0 by the author.