PowerShell+ 2019 - CypherDog2.0 - Bloodhound Dog Whispering with PowerShell by Walter Legowski

Channel:
Subscribers:
42,400
Published on ● Video Link: https://www.youtube.com/watch?v=koM5QcjWuPE



Duration: 57:36
29 views
0


BloodHound is a fantastic open source active directory graphing tool designed by @_Wald0, @CptJesus & @harmj0y.
Initialy created for offensive purposes, it has also quickly gained popularity within blue teams
and "regular" Active Directory Admins.
In this session, I will present CypherDog2.0, a PowerShell module designed to interact with BloodHound via its REST API for advanced interaction with the database, and allowing actions that can not be performed in the Bloodhound UI.
This PowerShell module runs Cypher queries under the hood (the neo4j database query language), and allows to get the maximum out of the Bloodhound data -including metrics as demonstrated by @_wald0 in his latest research- with a simplified dynamic syntax and cool PowerShell pipeline combos...
In this presentation, I will show how to
- Query database for Nodes, Edges and Paths and return objects
- Manipulate BloodHound Data (at scale)
- Request cheapest path (shortest is not always cheapest...)
- Chain cypher queries over PowerShell pipeline
- Query for possible relevant active directory metrics
...and more cool cypher tricks & BloodHound object manipulation from the comfort of a PowerShell prompt.

PowerShell Summit videos are recorded on a "best effort" basis. We use a room mic to capture as much room audio as possible, with an emphasis on capturing the speaker. Our recordings are made in a way that minimizes overhead for our speakers and interruptions to our live audience. These recordings are meant to preserve the presentations' information for posterity, and are not intended to be a substitute for attending the Summit in person. These recordings are not intended as professional video training products. We hope you find these videos useful - the equipment used to record these was purchased using generous donations from members of the PowerShell community.




Other Videos By Confreaks


2022-09-01PowerShell+ 2019 - Firewall Evasion and Remote Access with OpenSSH by Anthony Nocentino
2022-09-01PowerShell+ 2019 - Securing PowerShell: Hands-On Lab by Ashley McGlone
2022-09-01PowerShell+ 2019 - Microsoft Azure Policy Guest Configuration by Michael Greene
2022-09-01PowerShell+ 2019 - Writing Compiled PowerShell Cmdlets by Thomas Rayner
2022-09-01PowerShell+ 2019 - Parselmouth - bending the PowerShell language by Mathias Jessen
2022-09-01PowerShell+ 2019 - PowerShell Remoting Internals by Paul Higinbotham
2022-09-01PowerShell+ 2019 - PSScriptAnalyzer (PSSA) VS-code integration & ... by Christoph Bergmeister
2022-09-01PowerShell+ 2019 - Unexplained phenomena: powerful tricks you likely didn't know... by Kirk Munro
2022-09-01PowerShell+ 2019 - Bullet-proofing Patterns & Practices by Joel "Jaykul" Bennett
2022-09-01PowerShell+ 2019 - Machine Learning Algorithms with H2o and PowerShell by Tome Tanasovski
2022-09-01PowerShell+ 2019 - CypherDog2.0 - Bloodhound Dog Whispering with PowerShell by Walter Legowski
2022-09-01PowerShell+ 2019 - Dungeons & Dragons & Development: How Playing Games Makes... by Michael Lombardi
2022-09-01PowerShell+ 2019 - Going Core with VMware PowerCLI! by Luc Dekens
2022-09-01PowerShell+ 2019 - Working with PSGraph by Kevin Marquette
2022-09-01PowerShell+ 2019 - Life after "git push" by Steven Murawski
2022-09-01PowerShell+ 2019 - Secure PowerShell web tools with System Frontier by Jay Adams
2022-09-01PowerShell+ 2019 - Demystifying Terraform - "Hardcore" to Core Infrastructure... Tool by Chris Hunt
2022-09-01PowerShell+ 2019 - PowerShell + AutoRest + Swagger = Instant Modules by Adam Murray
2022-09-01PowerShell+ 2019 - Testing, Testing, 1...2...3: Using Pester for Infrastructure ... by Brandon Olin
2022-09-01PowerShell+ 2019 - Containers - You Better Get on Board! by Anthony Nocentino
2022-09-01PowerShell+ 2019 - Unleash your PowerShell with AWS Lambda and Serverless Computing by Andrew Pearce