Objective:

Objectives:

Initial Credentials

Bloodhound Scan

You’ll have to Google for ‘set up bloodhound Kali Linux.’ There are a few steps that have to be taken. (Very easily referenced!)

Once initial access is gained to an Active Directory network, Bloodhound is usually run early as it gives solid output. Everything Bloodhound tells us can also be obtained via PowerShell manually, but Bloodhound does a great job of performing basic enumeration and presenting the data visually.

There are several ways to run a bloodhound scan.

bloodhound-python -c all -u 'mary' -p 'Student123!' -ns 172.25.90.83 -d vuln.icsi --zip

Untitled