⚔️5.2 - Bloodhound

Bloodhound is a nice tool for the quick and easy enumeration of AD. We need two things, the bloodhound and the python ingestor
BloodHound General
Installation & Speed Use
With this commands we can install the bloodhound and ingestor ez, gg wp
Bloodhound-python Ingestor
sudo bloodhound-python --zip -c All -d north.sevenkingdoms.local -u brandon.stark -p iseedeadpeople -dc winterfell.north.sevenkingdoms.local -ns 192.168.56.11
-d
: Domain by recolet information
-u
: Username for connect
-p
: Password for connect
-dc
: Domain Controler (DC) - Name of host
-ns
: DNS server - His IP
Maybe, you need to use the flag
-ns
and insert the ip of server. Then it save with a name, example: 20250530073027_bloodhound.zip. Now we need do with all domains ...
BloodHound CE
After logging in to the BloofdHound:
File Ingest Upload
1ºGo to http://localhost:8080/ui/login 2ºLog in with admin credentials 3ºDrag and upload the ZIP file generated by bloodhound-python

Search Custom Queries
## show all domains and computer
MATCH p = (d:Domain)-[r:Contains*1..]->(n:Computer) RETURN p
## show all the users
MATCH p = (d:Domain)-[r:Contains*1..]->(n:User) RETURN p
## overall map of domains/groups/users
MATCH q=(d:Domain)-[r:Contains*1..]->(n:Group)<-[s:MemberOf]-(u:User) RETURN q
## see the users ACL
MATCH p=(u:User)-[r1]->(n) WHERE r1.isacl=true and not tolower(u.name) contains 'vagrant' RETURN p

Last updated