ADCS Attack Paths in BloodHound
Hallo zusammen, sofern nicht selber schon gesehen/-lesen hier [0] FYI "ADCS Attack Paths in BloodHound" (Teil 1) Infos zu BloodHound [1] "... uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. ... Defenders can use BloodHound to identify and eliminate those same attack paths ..." bzw. FalconHound [2] "... allows you to utilize and enhance the power of BloodHound in a more automated fashion ... designed to be used in conjunction with a SIEM or other log aggregation tool ..." VG Bernd [0] https://posts.specterops.io/adcs-attack-paths-in-bloodhound-part-1-799f3d3b0... [1] https://github.com/BloodHoundAD/BloodHound [2] https://github.com/FalconForceTeam/FalconHound -- Bernd Kohler IT Center Abteilung: Netze RWTH Aachen University Wendlingweg 10 52074 Aachen Tel: +49 241 80-29793 Fax: +49 241 80-22666 kohler@itc.rwth-aachen.de https://www.itc.rwth-aachen.de Social Media Kanäle des IT Centers: https://blog.rwth-aachen.de/itc/ https://www.facebook.com/itcenterrwth https://www.linkedin.com/company/itcenterrwth https://twitter.com/ITCenterRWTH https://www.youtube.com/channel/UCKKDJJukeRwO0LP-ac8x8rQ
Hallo zusammen, sofern nicht selber schon gesehen/-lesen hier [0] FYI "SOAPHound" --> tool to collect Active Directory data via ADWS --> Ergänzung zu BloodHound/FalconHound --> siehe dazu auch [1] Bernd [0] https://github.com/FalconForceTeam/SOAPHound [1] https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-da... -- Bernd Kohler IT Center Abteilung: Netze RWTH Aachen University Wendlingweg 10 52074 Aachen Tel: +49 241 80-29793 Fax: +49 241 80-22666 kohler@itc.rwth-aachen.de https://www.itc.rwth-aachen.de Social Media Kanäle des IT Centers: https://blog.rwth-aachen.de/itc/ https://www.facebook.com/itcenterrwth https://www.linkedin.com/company/itcenterrwth https://twitter.com/ITCenterRWTH https://www.youtube.com/channel/UCKKDJJukeRwO0LP-ac8x8rQ
participants (1)
-
Bernd Kohler