
Bloodhound is a data collecting tool for Active Directory environments, which helps identify attack paths left open due to misconfigurations or vulnerabilities. There is a free version of Bloodhound and there is also an enterprise version. In this post, we will be using the free version.
Pre-requisites:
Bloodhound ingestor (Python-based)
Bloodhound
Assuming you have already installed the pre-requisites and you have an AD account that have permission to query LDAP objects, we can now proceed with data collection.
Run this command from your attacker machine (inside the folder where the Bloodhound ingestor Python file is saved) to collect data from the target domain controller:
python3 bloodhound.py -u <USERNAME> -p '<PASSWORD>' -d <DOMAIN> --collectionmethod LocalAdmin --zip -ns <SERVER_IP_ADDRESS>

Run neo4j console in the VM where you have installed it:

On another tab, run Bloodhound as a non-root user:



