# BloodHound
> Tipo: **tool** · S0521 · [MITRE ATT&CK](https://attack.mitre.org/software/S0521)
## Descrição
[[s0521-bloodhound|BloodHound]] é uma ferramenta de reconhecimento do Active Directory (AD) que pode revelar relacionamentos ocultos e identificar caminhos de ataque em um ambiente AD.
**Plataformas:** Windows
## Técnicas Utilizadas
- [[t1069-002-domain-groups|T1069.002 - Domain Groups]]
- [[t1615-group-policy-discovery|T1615 - Group Policy Discovery]]
- [[t1560-archive-collected-data|T1560 - Archive Collected Data]]
- [[t1069-001-local-groups|T1069.001 - Local Groups]]
- [[t1087-002-domain-account|T1087.002 - Domain Account]]
- [[t1087-001-local-account|T1087.001 - Local Account]]
- [[t1033-system-owneruser-discovery|T1033 - System Owner/User Discovery]]
- [[t1018-remote-system-discovery|T1018 - Remote System Discovery]]
- [[t1106-native-api|T1106 - Native API]]
- [[t1059-001-powershell|T1059.001 - PowerShell]]
- [[t1482-domain-trust-discovery|T1482 - Domain Trust Discovery]]
## Grupos que Usam
- [[g0102-conti-group|Wizard Spider]]
- [[g0016-apt29|APT29]]
- [[g0114-chimera|Chimera]]
- [[ta505|TA505]]
- [[g1040-play|Play]]
- [[g1003-ember-bear|Ember Bear]]
## Referências
- [MITRE ATT&CK - S0521](https://attack.mitre.org/software/S0521)