<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Manually Parse Bloodhound Data with JQ to Create Lists of Potentially Vulnerable Users and Computers</title>
        <link>https://stream.echo6.co/videos/watch/6be3b64a-d9de-42ae-963d-75679be7a461</link>
        <description>00:00 - Intro talking about why we want to parse Bloodhound Data with JQ to create lists 00:43 - Just examining the data in Bloodhound 01:28 - Writing a Cipher Query to show all enabled users in Bloodhound 02:35 - Showing Bloodhound Debug Mode which will show Cipher Queries when you run them 03:28 - Start of looking at Bloodhound Data 04:25 - Digging through the JSON Structure with JQ to get to the Properties of a User 06:30 - Showing all the names, if we wanted to remove the quotes, we could use the -r flag for raw 06:50 - Using the Select Query in JQ to show only enabled/disabled users 07:45 - Outputting multiple fields in JQ so we can show usernames + descriptions 08:20 - Using JQ to filter out descriptions with null to only show AD Accounts with a description 09:30 - Talking about LastLogon and LastLogonTimeStamp 10:45 - Converting integers to string in JQ so we can output them 12:00 - Outputting all accounts where a PwdLastSet is Greater than the users last logon 14:10 - Using JQ to filter out empty array's which lets use find all accounts that are kerberoastable 14:50 - Using JQ to parse the computers and showing operating systems 15:50 - Filtering out Operating Systems which may help us find end of life OS's 16:30 - Using JQ to show each computers last logon which will let us view all active computers</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:23:46 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Manually Parse Bloodhound Data with JQ to Create Lists of Potentially Vulnerable Users and Computers</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/6be3b64a-d9de-42ae-963d-75679be7a461</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=6be3b64a-d9de-42ae-963d-75679be7a461" rel="self" type="application/rss+xml"/>
    </channel>
</rss>