Adalanche is a visual tool for mapping out you’re active directly domain and all its objects and links, it is a little more bloodhound, The purpose of this tool is to do risk-based remediation and map out attack vectors.
However, unlike bloodhound, you don’t need a Neo4J database, then a collector service to grab the data - this application is very nicely packaged into a single executable, you can run it on Linux or Windows
You can quite happily run this tool as a user, and while some company administrators will be worried about is it dangerous or does it attack the domain - The question you need to ask is if you don’t run it can you afford not to run it?
All information like this that’s about the security of your domain is absolutely good information if used in the correct fashion, remember if you can run it at User, so can anybody else on your domain - Don’t immediately block applications, because ignorance in this example is absolutely not blissful.
Download Adalanche
Downloading this application is very simple, navigate to this link below:
https://github.com/lkarlslund/Adalanche/releases/tag/v2024.1.11
If you scroll down, section labeled assets, this will give you for your binaries for the relevant operating system plan to use it with:
Then you need to yet again keep the file, this is good if this is malicious, but not for labs and testing:
adalanche-windows-x64-v2024.1.11.exe
This needs to be renamed to the correct name with this command:
ren adalanche-windows-x64-v2024.1.11.exe adalanche.exe
Then it will automatically start your default browser and show you the graphing and mapping like this however this image is a new domain with a couple of users to it looks simple and easy to understand:
You then get a load of preset queries where you can choose one and then select "analyse" and you will see the results in the mapping:
It is also interactive, so for example if you right click on the domain controller called FakeDC and choose "paths to target" you get a nicely formatted interactive map:
If you are interested the LDAP for this inside the utility is as follows for my example:
(distinguishedname=CN=FakeDC,OU=Domain Controllers,DC=bear,DC=local)
Silent Version : Dump Data from ADExplorer
One connected, chose the domain options, usually the one at the stop then choose "Create Snapshot"
Then will in the details in the next window give it a name and a location to save the file then click OK:
While it saves, there is no progress bar so be patient, you may notice it might say "not responding" but wait for it to complete, be patient.
adalanche collect activedirectory --adexplorerfile=lootfile.bin