Идём по киберследу: Анализ защищенности Active Directory c помощью утилиты BloodHound — страница notes из 46

Сноски

1

https://github.com/Seyaji/adelante.

2

https://github.com/vletoux/pingcastle.

3

https://github.com/BloodHoundAD/BloodHound.

4

https://github.com/davidprowe/BadBlood.

5

https://jdk.java.net/java-se-ri/11-MR2.

6

https://neo4j.com/
.

7

https://github.com/BloodHoundAD/BloodHound/releases.

8

https://github.com/BloodHoundAD/SharpHound/releases.

9

https://github.com/SadProcessor/HandsOnBloodHound/blob/master/BH21/BH4_SharpHound_Cheat.pdf.

10

https://github.com/neo4j-contrib/neo4j-apoc-procedures/releases/4.4.0.1

11

https://neo4j.com/docs/cypher-manual/current/introduction/
.

12

https://nodejs.org/en/download/

13

https://git-scm.com/download/win.

14

https://github.com/BloodHoundAD/BloodHound.

15

https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1.

16

https://github.com/S3cur3Th1sSh1t/Creds/blob/master/PowershellScripts/Invoke-SMBNegotiate.ps1.

17

https://learn.microsoft.com/en-us/windows/win32/ADSchema/active-directory-schema.

18

https://github.com/GhostPack/Certify.

19

https://github.com/ly4k/Certipy.