← Back to Identifying Privilege Paths with BloodHound

Identifying Privilege Paths with BloodHound Quiz

6 questions


1.What privilege level is required to collect BloodHound data with SharpHound?

2.What makes a BloodHound attack path a 'practical' path versus a 'theoretical' one?

3.Why is marking compromised accounts as 'owned' in BloodHound important during an engagement?

4.What is the core value of BloodHound's transitive control analysis?

5.A colleague presents a BloodHound screenshot showing a path to Domain Admins and says 'this is the finding.' What is wrong with this approach?

6.How would you explain a BloodHound privilege escalation path to a non-technical stakeholder?