Read the rest of BloodHound – Hacking Active Directory Trust Relationships today! Only available at Darknet.
Attackers may use BloodHound to identify complex attack paths that would be impossible to swiftly identify. Defenders can use it to identify and remove those assault paths. Both red and blue teams can utilize BloodHound to readily gain a deeper understanding of privilege relationships in an Active Directory environment.

For hacking directory trust relationships bloodHound is and it uses graph theory to reveal the hidden and frequently casual relationships within an Active Directory environment.