BloodHound by Example

A demonstration of how BloodHound can be used to exploit Active Directory based networks.