Copy bloodhound.py -u 'forend' -p 'Klmcargo2' -ns 172.16.5.5 -d inlanefreight.local -c all --zip
Copy dnschef --fakeip 10.10.225.134
Copy bloodhound.py -u 'rsmith' -p 'IHateEric2' -d lab.trusted.vl -dc labdc.lab.trusted.vl -c all -ns 127.0.0.1
Copy (NODES)-[:RELATIONSHIP]->(NODES)
Copy MATCH (m:Computer) RETURN m
Copy MATCH p = (c:Computer)-[:HasSession]->(m:User) RETURN p
Copy cat 20240302180235_users.json | jq '.data[].Properties | .samaccountname + ":" + .description' -r
Copy MATCH p1=shortestPath((u1:User)-[r1:MemberOf*1..]->(g1:Group)) MATCH p2=(u1)-[:SQLAdmin*1..]->(c:Computer) RETURN p2
Copy MATCH p1=shortestPath((u1:User)-[r1:MemberOf*1..]->(g1:Group)) MATCH p2=(u1)-[:CanPSRemote*1..]->(c:Computer) RETURN p2
To check users who can RDP
Copy MATCH p1=shortestPath((u1:User)-[r1:MemberOf*1..]->(g1:Group)) MATCH p2=(u1)-[:CanPSRemote*1..]->(c:Computer) RETURN p2
Copy MATCH p1=shortestPath((u1:User)-[r1:MemberOf*1..]->(g1:Group)) MATCH p2=(u1)-[:SQLAdmin*1..]->(c:Computer) RETURN p2
Copy Import-Module .\PowerUpSQL.ps1
Get-SQLInstanceDomain
Copy mssqlclient.py <domain>/<user>@<ip> -windows-auth