# BloodHound > Tipo: **tool** · S0521 · [MITRE ATT&CK](https://attack.mitre.org/software/S0521) ## Descrição [[s0521-bloodhound|BloodHound]] é uma ferramenta de reconhecimento do Active Directory (AD) que pode revelar relacionamentos ocultos e identificar caminhos de ataque em um ambiente AD. **Plataformas:** Windows ## Técnicas Utilizadas - [[t1069-002-domain-groups|T1069.002 - Domain Groups]] - [[t1615-group-policy-discovery|T1615 - Group Policy Discovery]] - [[t1560-archive-collected-data|T1560 - Archive Collected Data]] - [[t1069-001-local-groups|T1069.001 - Local Groups]] - [[t1087-002-domain-account|T1087.002 - Domain Account]] - [[t1087-001-local-account|T1087.001 - Local Account]] - [[t1033-system-owneruser-discovery|T1033 - System Owner/User Discovery]] - [[t1018-remote-system-discovery|T1018 - Remote System Discovery]] - [[t1106-native-api|T1106 - Native API]] - [[t1059-001-powershell|T1059.001 - PowerShell]] - [[t1482-domain-trust-discovery|T1482 - Domain Trust Discovery]] ## Grupos que Usam - [[g0102-conti-group|Wizard Spider]] - [[g0016-apt29|APT29]] - [[g0114-chimera|Chimera]] - [[ta505|TA505]] - [[g1040-play|Play]] - [[g1003-ember-bear|Ember Bear]] ## Referências - [MITRE ATT&CK - S0521](https://attack.mitre.org/software/S0521)