Bloodhound
Extra: https://hausec.com/2019/09/09/bloodhound-cypher-cheatsheet/
Start Neo4j
Open a web browser and navigate to http://localhost:7474/
SharpHound.exe
SharpHound has a number of different collection methods (all documented on the repository):
Default - Performs group membership collection, domain trust collection, local group collection, session collection, ACL collection, object property collection, and SPN target collection
Group - Performs group membership collection
LocalAdmin - Performs local admin collection
RDP - Performs Remote Desktop Users collection
DCOM - Performs Distributed COM Users collection
PSRemote - Performs Remote Management Users collection
GPOLocalGroup - Performs local admin collection using Group Policy Objects
Session - Performs session collection
ComputerOnly - Performs local admin, RDP, DCOM and session collection
LoggedOn - Performs privileged session collection (requires admin rights on target systems)
Trusts - Performs domain trust enumeration
ACL - Performs collection of ACLs
Container - Performs collection of Containers
DcOnly - Performs collection using LDAP only. Includes Group, Trusts, ACL, ObjectProps, Container, and GPOLocalGroup.
ObjectProps - Performs Object Properties collection for properties such as LastLogon or PwdLastSet
All - Performs all Collection Methods except GPOLocalGroup.
SharpHound.ps1
Bloodhound Query
Service Principal Name (SPN)
Shortest Paths from Kerberoastable Users
Unconstrained Delegation
AllowedToDelegate to other computers
ASREP Roasting
Constrained Delegation
GPO Query
Discretionary Access Control Lists
Potential MS SQL Admins
LAPS
Last updated