-
Notifications
You must be signed in to change notification settings - Fork 6
/
tool--066b057c-944e-4cfc-b654-e3dfba04b926.json
41 lines (41 loc) · 1.89 KB
/
tool--066b057c-944e-4cfc-b654-e3dfba04b926.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
{
"id": "tool--066b057c-944e-4cfc-b654-e3dfba04b926",
"name": "BloodHound",
"description": "[BloodHound](https://attack.mitre.org/software/S0521) is an Active Directory (AD) reconnaissance tool that can reveal hidden relationships and identify attack paths within an AD environment.(Citation: GitHub Bloodhound)(Citation: CrowdStrike BloodHound April 2018)(Citation: FoxIT Wocao December 2019)",
"created_by_ref": "The MITRE Corporation",
"external_references": [
{
"external_id": "S0521",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0521"
},
{
"description": "Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.",
"url": "https://github.com/BloodHoundAD/BloodHound",
"source_name": "GitHub Bloodhound"
},
{
"source_name": "CrowdStrike BloodHound April 2018",
"url": "https://www.crowdstrike.com/blog/hidden-administrative-accounts-bloodhound-to-the-rescue/",
"description": "Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020."
},
{
"source_name": "FoxIT Wocao December 2019",
"url": "https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdf",
"description": "Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China\u2019s hidden hacking groups. Retrieved October 8, 2020."
}
],
"type": "tool",
"labels": [
"tool"
],
"modified": "2020-11-24T20:08:25.559Z",
"created": "2020-10-28T12:51:29.358Z",
"x_mitre_platforms": [
"Windows"
],
"x_mitre_aliases": [
"BloodHound"
],
"x_mitre_version": "1.0"
}