Ef73a0a3ea76c2e600288ebd521c1984

Abstract

This session will be a demo on

BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a PowerShell ingestor.

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.

For more details https://github.com/adaptivethreat/BloodHound/wiki

Speaker

Sachin

Timing

Starts at Friday October 21 2016, 04:00 PM. The sessions runs for about 1 hour.

Resources