Domain Enumeration
BloodHound
Running a Collector
# Running the precompiled binary on a domain joined Windows system
SharpHound.exe
# Specify domain within SharpHound
SharpHound.exe -d $domain
# Collection method all
SharpHound.exe --CollectionMethod All --ZipFileName output.zip
# Python collector
## https://github.com/fox-it/BloodHound.py
bloodhound.py -d $domain -v --zip -c All -dc $dcfqdn -ns $dcipQueries
# Identify Users with an SPN Set:
MATCH (u:User {hasspn:true}) RETURN u
# Identify computers with unconstrained delegation enabled:
MATCH (c:Computer {unconstraineddelegation:true}) RETURN c
# Identify computers with constrained delegation configured:
MATCH (c:Computer), (t:Computer), p=((c)-[:AllowedToDelegate]->(t)) RETURN p
# Identify computers with LAPS enabled:
MATCH (c:Computer {haslaps: true}) RETURN cPowerView
References
Last updated
