BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time. Full User Guide and Info Commands NONE : At this time all items of the script are configured in the .ps1 files. Files are outlined on the User Guide on Secframe.com Acknowledgments I'd like to send thanks to the countless people who wanted this as a product and waited while I made it! Screenshots Installation Requirements: Domain Admin and Schema Admin permissions Active Directory Powershell Installed Running On Windows: clone the repo git clone https://github.com/davidprowe/badblood.git Run Invoke-badblood.ps1 ./badblood/invoke-badblood.ps1 Talk About the BadBlood Message or Follow me on twitter @ davidprowe Drop a note on secframe.com I am not responsible for cleanup if this is run in a production domain Disclaimer Please note: all tools/ scripts in this repo are released for use "AS IS" without any warranties of any kind, including, but not limited to their installation, use, or performance. We disclaim any and all…
0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2020-03-02 07:00:002020-03-02 07:00:00BadBlood - Fills A Microsoft Active Directory Domain With A Structure And Thousands Of Objects
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com