We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Blue Team Village - BloodHound From Red to Blue 1 point 5

00:00

Formal Metadata

Title
Blue Team Village - BloodHound From Red to Blue 1 point 5
Title of Series
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
BloodHound was originally built for Pentesters to easily identify highly complex attack paths but it can also be used to improve the overall security posture of your Active Directory. We will start with a short introduction to graph databases and how the different parts of Bloodhound work. We will then discuss some useful tips on using the GUI to visualize various attack paths then we will venturing into the world of custom Cypher Queries. Using this new knowledge, we will set off on a path of destruction, targeting the attack paths in our environment and visualizing the effects of our planned remediations on these attack paths.
Information security
Presentation of a groupInformation securitySlide ruleKettenkomplex
Electronic mailing listGraph theory
Maxima and minimaUser interface
Graph (mathematics)
Graph (mathematics)
Well-formed formulaView (database)TheoryIntegrated development environmentComplex (psychology)Directory service
Time domainDegree (graph theory)Surface of revolution
Query languageObject (grammar)Computer networkGraph (mathematics)Software testingReal number
Coma Berenices
Graphical user interface
Video game consoleGraph (mathematics)DatabaseHill differential equationIntegrated development environment
Error messageStatement (computer science)outputClient (computing)Graph (mathematics)DatabaseNumeral (linguistics)Time domainGame controllerHill differential equation
Object (grammar)
Digital filterLocal GroupMoving averageIntegrated development environment
Query languageLocal Group
Statement (computer science)Operator (mathematics)
User profileQuery languageTime domainComputerElectronic mailing list
LengthAverageVariety (linguistics)Time domainComputerRecursive descent parserQuery language
Electric currentCheat <Computerspiel>MIDITime domainSystem administratorSoftware testing
Integrated development environmentControl flowLink (knot theory)ComputerLocal ringFinitary relationSoftware testingTime domainDigital filterComputer configuration
Local GroupComputerDigital filterFinitary relationSoftware testing
Query languageSoftware testingLipschitz-Stetigkeit
Software testingData type
Digital filter
Finitary relationTable (information)Local ring
Local ringTable (information)
Table (information)Local ring
Finitary relationLatent heat
Programmer (hardware)
Uniqueness quantificationTime domainEnterprise architectureSet (mathematics)
Gastropod shellMassLocal ringTime domain
Graph (mathematics)Data managementRule of inferenceTraffic reporting
Ext functorExplosionTime domain
Total S.A.Local Group
Table (information)MIDI3 (number)Normed vector space
SummierbarkeitLocal GroupComputerLocal ring
AutomatonSoftware testingLocal Group
Local ringTime domainLocal GroupReading (process)
Formal languageQuery languageGraph (mathematics)Automation
Link (knot theory)