Skip to content

Detect connections between Bloodhound objects wich are considered illegal by AD Tiering from Microsoft

License

Notifications You must be signed in to change notification settings

PatchRequest/AD-Strider

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AD Strider

A security automation tool to detect misconfigurations in an active directory by analyzing data from Bloodhound

Configuration

The config file "config.json" contains a two list of all connections between AD-Objects. Each list is for a specific direction (T1 -> T0 or T0 -> T1) If the value is set to true the connection will be marked as misconfiguration

Example:

A User from Tier1 should not have admin permissions for a Tier0 object

[...]
"IntoT0": {
        "AdminTo": true,
[...]

A User from Tier0 is allowed to have admin permissions for a Tier1 object

[...]
"IntoT1": {
        "AdminTo": false,
[...]

Setup

Download the latest release for your platform from Github here or build it on your own with

go build .

Usage

Licence

About

Detect connections between Bloodhound objects wich are considered illegal by AD Tiering from Microsoft

Topics

Resources

License

Stars

Watchers

Forks

Languages