Get Bloodhound data without being spotted by AV/EDR
Use
- https://learn.microsoft.com/en-us/sysinternals/downloads/adexplorer
- https://github.com/fortalice/bofhound
- https://gist.githubusercontent.com/kozmer/725cde788e4b3c8bdd870468c243916b/raw/31fe6dc8eb89bb4bcac414f55bc91169d63864d8/ldapsearch_parser.py
- ldapsearch -LLL -o ldif-wrap=no -E ‘!1.2.840.113556.1.4.801=::MAMCAQc=’ -H ldap:// -Y GSSAPI -N -b “DC=,DC=” “(&(objectClass=*))” > ldapsearch_output.txt