Automated Information Gathering
SharpHound
You can get sharphound from here:https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/SharpHound.ps1
Import SharpHound:
Import-Module .\Sharphound.ps1Collect data:
Invoke-BloodHound -CollectionMethod All -OutputDirectory <SAVE_DIRECTORY_PATH> -OutputPrefix "audit"LDAPDomainDump
Make and enter the directory to store output.
mkdir contoso.com && cd contoso.comRun LDAPDomainDump.
sudo ldapdomaindump ldap://<victim_ip> -u '<domain\<user>' -p '<password>'Bloodhound
Neo4j is required to run Bloodhund. Click the link from command output.
sudo neo4j consoleRun Bloodhound:
In bloodhound you can access data using custom queries. Sample queries:
Cheatsheet: https://hausec.com/2019/09/09/bloodhound-cypher-cheatsheet/
Run Bloodhound-python:
Then import the data into Bloodhound.
In order to exploit security flaws you may need the PowerView module on the victims machine.
Plumhound
You can enumerate the domain using Plumhound tool and get response in format of html file.
See if the Plumhound works properly:
Execute tasks:
PingCastle
Another tool for domain enumeration. Useful after compromising the machine.
Just run the pingcastle.exe.
Download link: https://www.pingcastle.com/download/
Last updated