BloodHound is considered a "post exploitation" tool, meaning you would typically run it once you have access to the internal network or an AD host in order to enumerate the AD environment and identify paths for privilege escalation. Since this is only a scan, the penetration tester would need to find a vulnerability to exploit before he/she can execute BloodHound
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ZoeAnneTaylor
Highly Voted 3 months, 1 week agoNikamy
Most Recent 1 month, 3 weeks agoNetworkTester1235
3 days agoBlackSkullz
1 month, 3 weeks ago