<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Bloodhound on LEIKAH</title><link>https://leikah.haoyingcao.xyz/en/tags/bloodhound/</link><description>Recent content in Bloodhound on LEIKAH</description><generator>Hugo</generator><language>en</language><atom:link href="https://leikah.haoyingcao.xyz/en/tags/bloodhound/index.xml" rel="self" type="application/rss+xml"/><item><title>Domain Enumeration with Bloodhound CE</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/bloodhound/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/bloodhound/</guid><description>&lt;p&gt;BloodHound allows information about domain accounts and their relationships to be collected automatically and then analyzed and presented in a graph format. It is very powerful to discover hidden and often unintended access rights and privileges possessed by principals. It also give suggestions on how attackers may abuse those access to achieve lateral movement or privilege escalation.&lt;/p&gt;
&lt;p&gt;Please consult this &lt;a href="https://bloodhound.specterops.io/get-started/quickstart/community-edition-quickstart"&gt;quick start guide&lt;/a&gt; on how to install and set up the newest version of BloodHound Community Edition.&lt;/p&gt;</description></item></channel></rss>