BloodHound & Other AD Enum Tools
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
AD ExplorerăŻSysinternal Suiteăźäžéšă§ăïŒ
é«ćșŠăȘActive Directory (AD) ăă„ăŒăąăăăłăšăăŁăżă§ăăAD ExplorerăäœżçšăăăšăADăăŒăżăăŒăčăç°Ąćă«ăăăČăŒăăăăæ°ă«ć „ăăźć ŽæăćźçŸ©ăăăă€ăąăă°ăăăŻăčăéăăă«ăȘăăžă§ăŻăăźăăăăăŁăć±æ§ăèĄšç€șăăæš©éăç·šéăăăȘăăžă§ăŻăăźăčăăŒăăèĄšç€șăăäżćăăŠććźèĄă§ăăé«ćșŠăȘæ€çŽąăćźèĄă§ăăŸăă
AD ExplorerăŻADăźăčăăăă·ă§ăăăäœæă§ăăăăăăȘăă©ă€ăłă§çąșèȘă§ăăŸăă ăȘăă©ă€ăłă§èćŒ±æ§ăçșèŠăăăăæéăéăăŠAD DBăźç°ăȘăç¶æ ăæŻèŒăăăăăăăă«äœżçšă§ăăŸăă
æ„ç¶ăăăăă«ăŻăăŠăŒă¶ăŒćăăăčăŻăŒăăăăăłæ„ç¶ć ăźăăŁăŹăŻă·ă§ăłăćż èŠă§ăïŒä»»æăźADăŠăŒă¶ăŒăćż èŠă§ăïŒă
ADăźăčăăăă·ă§ăăăććŸăăă«ăŻăFile
--> Create Snapshot
ă«ç§»ćăăăčăăăă·ă§ăăăźććăć
„ćăăŸăă
ADReconăŻăADç°ćąăăăăŸăăŸăȘăąăŒăăŁăăĄăŻăăæœćșăăŠç”ćăăăăŒă«ă§ăăăăźæ ć ±ăŻăćæăćźčæă«ăăăżăŒăČăăADç°ćąăźçŸćšăźç¶æ ăźć šäœćăæäŸăăăăăźăĄăăȘăăŻăć«ăçčć„ă«ăă©ăŒăăăăăăMicrosoft Excel ăŹăăŒăă§æç€șă§ăăŸăă
From https://github.com/BloodHoundAD/BloodHound
BloodHoundăŻăLinkuriousăźäžă«æ§çŻăăăćäžăăŒăžăźJavascriptăŠă§ăăąăăȘă±ăŒă·ă§ăłă§ăElectronă§ăłăłăă€ă«ăăăC#ăăŒăżăłăŹăŻăżăŒă«ăăŁăŠäŸç”ŠăăăNeo4jăăŒăżăăŒăčăæăŁăŠăăŸăă
BloodHoundăŻăă°ă©ăçè«ăäœżçšăăŠăActive DirectoryăŸăăŻAzureç°ćąć ăźé ăăăăă°ăă°æćłăăȘăéąäżăæăăă«ăăŸăăæ»æè ăŻBloodHoundăäœżçšăăŠăèż éă«çčćźăăăăšăäžćŻèœăȘéćžžă«è€éăȘæ»æç”è·Żăç°Ąćă«çčćźă§ăăŸăăéČćŸĄè ăŻBloodHoundăäœżçšăăŠăćăæ»æç”è·Żăçčćźăæé€ăăăăšăă§ăăŸăăăă«ăŒăăŒă ăšăŹăăăăŒă ăźäžĄæčăăBloodHoundăäœżçšăăŠActive DirectoryăŸăăŻAzureç°ćąć ăźçčæš©éąäżăăăæ·±ăçè§Łăăăăšăă§ăăŸăă
ăăăăŁăŠăBloodhoundăŻăăăĄă€ăłăèȘćçă«ćæăăăăčăŠăźæ ć ±ăäżćăăćŻèœăȘçčæš©ææ Œç”è·ŻăèŠă€ăăă°ă©ăăäœżçšăăŠăăčăŠăźæ ć ±ăèĄšç€șăăçŽ æŽăăăăăŒă«ă§ăă
BloodHoundăŻăingestorsăšvisualisation applicationăź2ă€ăźäž»èŠăȘéšćă§æ§æăăăŠăăŸăă
ingestorsăŻăăăĄă€ăłăćæăăèŠèŠćăąăăȘă±ăŒă·ă§ăłăçè§Łă§ăăćœąćŒă§æ ć ±ăæœćșăăăăă«äœżçšăăăŸăă
visualisation applicationăŻneo4jăäœżçšăăŠăăăčăŠăźæ ć ±ăă©ăźăăă«éąéŁăăŠăăăăç€șăăăăĄă€ăłć ă§çčæš©ăææ ŒăăăăăŸăăŸăȘæčæłăç€șăăŸăă
BloodHound CEăźäœæćŸăăăăžă§ăŻăć šäœăDockerăźäœżăăăăăźăăă«æŽæ°ăăăŸăăăć§ăăæăç°ĄćăȘæčæłăŻăäșćă«æ§æăăăDocker Composeæ§æăäœżçšăăăăšă§ăă
Docker Composeăă€ăłăčăăŒă«ăăŸăăăăăŻDocker Desktopăźă€ăłăčăăŒă«ă«ć«ăŸăăŠăăăŻăă§ăă
ćźèĄăăŸă:
Docker ComposeăźăżăŒăăă«ćșćă§ă©ăłăă ă«çæăăăăăčăŻăŒăăèŠă€ăăŸăă
ăă©ăŠă¶ă§http://localhost:8080/ui/logină«ç§»ćăăŸăăăŠăŒă¶ăŒćadminăšăă°ăăăźă©ăłăă ă«çæăăăăăčăŻăŒăă§ăă°ă€ăłăăŸăă
ăăźćŸăă©ăłăă ă«çæăăăăăčăŻăŒăăć€æŽăăćż èŠăăăăæ°ăăă€ăłăżăŒăă§ăŒăčăæșćăăăŸăăăăăăçŽæ„ingestorsăăăŠăłăăŒăă§ăăŸăă
ăăă€ăăźăȘăă·ă§ăłăăăăŸăăăăăĄă€ăłă«ćć ăăŠăăPCăăSharpHoundăćźèĄăăçŸćšăźăŠăŒă¶ăŒăäœżçšăăŠăăčăŠăźæ ć ±ăæœćșăăăć ŽćăŻăæŹĄăźăăă«ă§ăăŸăïŒ
CollectionMethod ăšă«ăŒăă»ăă·ă§ăłă«ă€ăăŠăŻăăăĄăă§è©łăăèȘăăăšăă§ăăŸăă
ç°ăȘăèłæ Œæ ć ±ăäœżçšăăŠSharpHoundăćźèĄăăăć ŽćăŻăCMD netonlyă»ăă·ă§ăłăäœæăăăăăăSharpHoundăćźèĄă§ăăŸăïŒ
Bloodhoundă«ă€ăăŠè©łăăăŻired.teamăă芧ăă ăăă
Group3răŻăă°ă«ăŒăăăȘă·ăŒă«éąéŁăăActive DirectoryăźèćŒ±æ§ăèŠă€ăăăăăźăăŒă«ă§ăă ä»»æăźăăĄă€ăłăŠăŒă¶ăŒăäœżçšăăŠăăăĄă€ăłć ăźăăčăăăgroup3răćźèĄăăćż èŠăăăăŸăă
PingCastle ăŻADç°ćąăźă»ăă„ăȘăăŁć§żćąăè©äŸĄăăă°ă©ăä»ăăźăŹăăŒăăæäŸăăŸăă
ćźèĄăăă«ăŻăăă€ăăȘPingCastle.exe
ăćźèĄăăăšăăȘăă·ă§ăłăźăĄăă„ăŒăèĄšç€șăăă€ăłăżă©ăŻăăŁăă»ăă·ă§ăłăéć§ăăăŸăăäœżçšăăăăă©ă«ăăȘăă·ă§ăłăŻ**healthcheck
ă§ăăăĄă€ăłăźæŠèŠăçąșç«ăăèȘ€èšćźăèćŒ±æ§**ăèŠă€ăăŸăă
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)