<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Bloodhound on Heretek</title>
    <link>https://heretek.dev/pt/tags/bloodhound/</link>
    <description>Recent content in Bloodhound on Heretek</description>
    <image>
      <title>Heretek</title>
      <url>https://heretek.dev/og-image.png</url>
      <link>https://heretek.dev/og-image.png</link>
    </image>
    <generator>Hugo</generator>
    <language>pt</language>
    <lastBuildDate>Sat, 28 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://heretek.dev/pt/tags/bloodhound/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HTB Certified Writeup — Shadow Credentials, ACL Chains &amp; ADCS ESC9 (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-certified/</link>
      <pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-certified/</guid>
      <description>Box AD assumed breach. Abuso de WriteOwner num grupo, double shadow credentials chain, e abuso de certificado ADCS ESC9 até Domain Admin.</description>
    </item>
    <item>
      <title>BloodHound — Guia de Setup e Uso</title>
      <link>https://heretek.dev/pt/tools/bloodhound-quickstart/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/tools/bloodhound-quickstart/</guid>
      <description>Como eu configuro e uso o BloodHound CE pra enumeração AD — coleta, importação, e encontrando caminhos de ataque.</description>
    </item>
    <item>
      <title>Cheatsheet de Ataques Active Directory</title>
      <link>https://heretek.dev/pt/cheatsheets/active-directory/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/cheatsheets/active-directory/</guid>
      <description>Referência rápida pra enumeração AD, ataques Kerberos, lateral movement e comprometimento de domínio.</description>
    </item>
    <item>
      <title>HTB Active Writeup — Kerberoasting &amp; GPP Passwords (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-active/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-active/</guid>
      <description>Minha primeira box AD. Null session no SMB -&amp;gt; senha GPP no SYSVOL -&amp;gt; Kerberoasting do Administrator -&amp;gt; Domain Admin.</description>
    </item>
    <item>
      <title>HTB Blackfield Writeup — LSASS Dump &amp; VSS Shadow Copies (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-blackfield/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-blackfield/</guid>
      <description>Box AD Hard. AS-REP Roasting -&amp;gt; BloodHound -&amp;gt; ForceChangePassword -&amp;gt; lsass.DMP -&amp;gt; SeBackupPrivilege -&amp;gt; VSS snapshot -&amp;gt; NTDS.dit -&amp;gt; Domain Admin.</description>
    </item>
    <item>
      <title>HTB Forest Writeup — AS-REP Roasting, BloodHound &amp; DCSync (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-forest/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-forest/</guid>
      <description>Segunda box AD. AS-REP Roasting sem creds, caminho de ataque no BloodHound por 5 grupos nested, ACL abuse até DCSync.</description>
    </item>
    <item>
      <title>Metodologia de Ataque AD — De Zero a Domain Admin</title>
      <link>https://heretek.dev/pt/methodology/ad-attack-methodology/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/methodology/ad-attack-methodology/</guid>
      <description>Metodologia passo-a-passo pra atacar Active Directory — a chain que eu sigo em toda box AD.</description>
    </item>
  </channel>
</rss>
