BloodHound is a staple of modern offensive tradecraft. It gives both red teams and real threats the ability to map attack paths from entities they control to high value targets. But, it is an equally valuable tool for defenders - if you know how to use it.
In this module we introduce BloodHound from a defender's perspective. Rather than pick through the offense-friendly GUI, we jump into the Cypher query language and search for patterns of misconfiguration. These basic queries can be used to steer prevention efforts, or as a jumping-off point for threat hunting and detection engineering.
/mo
Explore realistic pre-recorded attacks
Master full-featured defensive platforms
Browser-based challenges and modules
Extended attack videos
Grants access to Analyst content. You can cancel any time by returning to this page and following the cancellation steps.
/mo
Instant fully interactive labs
Hands-on prevention and detection
Master offensive techniques
Security engineering exercises
Highly realistic and dynamic scenarios
Access to all Analyst-level content
Grants access to all Defender content, Analyst content and interactive lab environments. You can cancel any time by returning to this page and following the cancellation steps.