Identifies and analyzes complex attack paths within Active Directory environments using graph-based reconnaissance and relationship mapping.
This skill empowers AI agents to perform sophisticated Active Directory reconnaissance by leveraging BloodHound's graph theory capabilities. It provides structured guidance for collecting environment data via SharpHound, visualizing hidden relationships between AD objects, and uncovering unintended privilege escalation paths to high-value targets like Domain Admins. Designed for red teamers and security auditors, it streamlines the process of identifying misconfigured ACLs, Kerberoasting opportunities, and GPO abuse vectors while ensuring alignment with the MITRE ATT&CK framework.
주요 기능
01Step-by-step workflows for SharpHound and BloodHound.py data collection
02Identification of Kerberoasting, AS-REP roasting, and delegation abuses
03Mapping of complex ACL-based privilege escalation chains (GenericAll, WriteDACL)
044,121 GitHub stars
05Comprehensive integration with MITRE ATT&CK and NIST CSF security frameworks
06Advanced graph-based analysis of AD attack paths and hidden relationships
사용 사례
01Conducting authorized red team engagements and internal penetration tests
02Auditing Active Directory environments to identify and remediate misconfigurations
03Building and validating defensive detection signatures for AD-based attacks