Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
StephenHinck authored Feb 9, 2024
1 parent 316f1d3 commit 053d983
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ data collectors.

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure
environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be
impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red
impossible to identify quickly. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red
teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure
environment.

Expand Down Expand Up @@ -49,9 +49,9 @@ docker info
# Attempt to stop Neo4j Service if running (on Windows)
Stop-Service "Neo4j" -ErrorAction SilentlyContinue
```
- A succesfull installation of BloodHound CE would look like below:
- A successful installation of BloodHound CE would look like the below:

https://github.com/SpecterOps/BloodHound/raw/main/cmd/ui/public/img/BloodHoundCE-Deployment-Experience-Windows.mp4
https://github.com/SpecterOps/BloodHound/assets/12970156/ea9dc042-1866-4ccb-9839-933140cc38b9

## Useful Links

Expand All @@ -70,7 +70,7 @@ Please check out the [Contact page](https://github.com/SpecterOps/BloodHound/wik
## Licensing

```
Copyright 2023 Specter Ops, Inc.
Copyright 2024 Specter Ops, Inc.
Licensed under the Apache License, Version 2.0
you may not use this file except in compliance with the License.
Expand Down

0 comments on commit 053d983

Please sign in to comment.