davidprowe / BadBlood

BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
https://www.secframe.com/badblood
GNU General Public License v3.0
2.01k stars 273 forks source link

Problems executing the script in Windows AD 2016 #6

Closed ghost closed 3 years ago

ghost commented 3 years ago

I downloaded the zip, extracted to desktop. Then opened up powershell and executed the command .\invoke-badblood.ps1 I'm not sure if it's my problem or what but I can't get it to work in any way.

image

ghost commented 3 years ago

Didn't realize that AD wasn't installed properly...