Discovery with BloodHound
Offered By: Pluralsight
Course Description
Overview
Attacking Active Directory is a great way to achieve control of an environment, letting you access the data, and act on your objectives. BloodHound lets you visualize the shortest path to get to where you need to be.
Understanding the relationship between thousands of Active Directory objects can be difficult. Users are members of groups, which can be nested in other groups, and linked to thousands of permissions. In this course, Discovery with BloodHound, you will gain the ability to use BloodHound to quickly find the shortest path to compromise systems in an Active Directory environment. First, you will learn how to install BloodHound. Next, you will discover how to use SharpHound to gather data from AD. Finally, you will explore how to ingest and visualize that data, finding paths between objects and the ultimate goal, Domain Admin access. When you are finished with this course, you will have the skills and knowledge of BloodHound needed to start using it to attack AD, or to understand how to better defend it.
Understanding the relationship between thousands of Active Directory objects can be difficult. Users are members of groups, which can be nested in other groups, and linked to thousands of permissions. In this course, Discovery with BloodHound, you will gain the ability to use BloodHound to quickly find the shortest path to compromise systems in an Active Directory environment. First, you will learn how to install BloodHound. Next, you will discover how to use SharpHound to gather data from AD. Finally, you will explore how to ingest and visualize that data, finding paths between objects and the ultimate goal, Domain Admin access. When you are finished with this course, you will have the skills and knowledge of BloodHound needed to start using it to attack AD, or to understand how to better defend it.
Taught by
Guillaume Ross
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent