Open smokeintheshell opened 5 months ago
hey, im also having his issue; have you found a solution? @smokeintheshell
Happened to me with the exact version. any update? @gatariee @smokeintheshell
Happened to me with the exact version. any update? @gatariee @smokeintheshell
I couldn't get bloodhound.py to work. A workaround would be to use netexec's bloodhound collectors modules instead of bloodhound.py, this has proven more consistent for me.
no update for this on my side specifically with bloodhound-python
.
workarounds i've used are tunneling a windows box and using sharphound with an injected ticket and using nxc
as @gatariee mentioned.
It's been a hot minute since I looked into this, but out of curiosity @isfahany are you using a TGT or a ST for the LDAP service on the DC?
Attempting to use Kerberos with a ccache and
-k -no-pass
appears to not be working. After reading #141 I updated my BloodHound.py to 1.7.2 and reattempted using an obtained ticket but got the same errors:It looks like when specifying
-k -no-pass
and providing a ccache inKRB5CCNAME
,bloodhound-python
isn't using the ticket. If I then specify-u <UPN>
, I get prompted for a password despite using-no-pass
: