Bloodhound


BloodHound White on Red Logo

Bloodhound was developed by cyber-security experts Andrew Robbins Rohan Varsakar and Will Schroeder now. It is a post exploitation tool it is used to gather information and find paths once the attacker infiltrates into the network by pawning one low privilege machine first you would need to run bloodhound PowerShell script on the compromised computer it will automatically gather information and push it directly into the neo4j database next for analysis log in to bloodhound desktop application from here one can easily figure out a lot of stuff like properties of a node direct and derived relationships among nodes and user transitive relationships and most importantly the discovery of  exploitation paths to hire privileged nodes bloodhound makes it extremely easy for a red team to escalate his privileges by providing an exploitation path but by seeing the same path in advance a blue team can secure the network which makes bloodhound for both red and blue teams

Comments

Popular Posts