Welcome back to my blog, today we will discuss about what BloodHound is, how it can be used in active directory (AD) enumeration, installation steps, how to collect active directory data with SharpHound, how to analyze attack paths with BloodHound, how to exploit weak kerberos delegation, and how we can secure active directory against BloodHound attacks.
Continue reading »
Social Plugin