Pentest Notes
  • About
  • Notes
    • Methodologies & Tools
      • Scanning & Enumeration
        • Scanning
        • Port 21 - FTP
        • Port 22 - SSH
        • Port 23 - telnet
        • Port 25 - SMTP
          • Enumerate Users via SMTP
        • Port 53 - DNS
        • Port 110 - POP3
        • Port 111 - RPCBind
        • Port 123 - NTP
        • Port 139, 445 - SMB
        • Port 143 - IMAP
        • Port 161 - SNMP
        • Port 389 - LDAP
        • Port 1521 - Oracle DB Listener
        • Port 1433 - MSSQL
        • Port 2049 - NFS
        • Port 3306 - MySQL/MariaDB
        • Port 3389 - RDP
        • Port 5432 - Postgres
        • Port 6379 - Redis
        • Port 27017 - MongoDB
      • Active Directory
        • Housekeeping
        • DNS Recon
        • Finding Users
        • Client Side Attacks
        • PowerShell Domain Enumeration
        • Roasting
        • Mimikatz
        • Credential Attacks
        • Bloodhound
        • Persistence
        • Group Policy Attack Tools
        • Service Account Exploits
        • Delegation
        • Cheatsheets
        • Tool Repos
      • Privilege Escalation
        • Windows
          • Basic Methodology
          • UAC Bypass
          • Privilege Exploits
          • Service Exploits
          • Password Hunting
          • Scheduled Tasks
          • Insecure File Permissions
          • Driver Kernel Exploits
          • LAPS Password
          • AlwaysInstallElevated
          • SMBGhost
          • PowerShell
          • PowerUp
          • Enable Remote Desktop
          • Cheatsheets
        • Linux
          • Shell Upgrade
          • Basic Methodology
          • Adding User to /etc/passwd
          • Add User to /etc/sudoers
          • Docker Breakout
          • LD_Library
          • Checking Weird Binaries
          • Outdated Bash
          • NFS Root Squash
          • Resources
      • Web
        • IDOR
        • LFI - Local File Inclusion
          • Windows LFI List
        • RFI - Remote File Inclusion
        • Command Injection
        • Server Side Template Injection - SSTI
        • SQL Injection
          • Blind Injection Sample Script
        • XSS
        • Authentication
        • Administrative Portals
        • NodeJS
        • 403 Forbidden Bypass
      • Network Pivoting
      • Tools
        • Compiling
        • Cracking
        • Port Knocking
        • Shells
        • SQL
      • File Transfer
      • External
Powered by GitBook
On this page
  • Bloodhound-python Ingestor - Used From Kali
  • SharpHound.exe Ingestor - Used From Victim Windows Host
  • SharpHound.ps1 - Used From Victim Windows Host
  • Analyzing Data In BloodHound GUI
  1. Notes
  2. Methodologies & Tools
  3. Active Directory

Bloodhound

PreviousCredential AttacksNextPersistence

Last updated 2 years ago

NB: You may have to download the newest release from github

Bloodhound-python Ingestor - Used From Kali

bloodhound-python -d domain.com -u username -p passwsord -dc domain.com -ns $dcIP -c all
  • You can limit collection with comma-separated queries. see official doc above but I usually grab everything

SharpHound.exe Ingestor - Used From Victim Windows Host

NB: Collection method -All does not include GPOLocalGroup, so I normally add that!

SharpHound.exe --CollectionMethod All,GPOLocalGroup --Domain $domain

SharpHound.ps1 - Used From Victim Windows Host

. .\SharpHound.ps1
Invoke-Bloodhound -CollectionMethod All,GPOLocalGroup -Domain domain.local
  • adPEAS.ps1 will also dump this automatically!

Analyzing Data In BloodHound GUI

neo4j start
bloodhound --no-sandbox
  • Check out “Outbound Control Rights” to see what the a user has access to in the domain

  • Sometimes the “shortest path to X” selection might work but usually it's many steps away or some ways aren't clear

https://github.com/fox-it/BloodHound.py
https://github.com/BloodHoundAD/BloodHound/releases
https://github.com/BloodHoundAD/BloodHound/tree/master/Collectors
https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound.html
https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound-all-flags.html
https://bloodhound.readthedocs.io/en/latest/_images/SharpHoundCheatSheet.png