BloodHound
Initialize
sudo neo4j console
- Now we need to change the default credentials for neo4j. Navigate to http://localhost:7474/ and login with the default credentials
username: neo4j password: neo4j
BloodHound Python
- This package contains a Python based ingestor for BloodHound, based on Impacket. BloodHound.py currently has the following limitations: * Supports most, but not all BloodHound (SharpHound) features. Primary missing features are GPO local groups and some differences in session resolution between BloodHound and SharpHound. * Kerberos authentication support is not yet complete, but can be used from the updatedkerberos branch.
Executing BloodHound.py
sudo bloodhound-python -u 'forend' -p 'Klmcargo2' -ns 172.16.5.5 -d inlanefreight.local -c all
Simple bash script to do this
#!/bin/bash
# bloodhound-python -d <domain> -u <username> -p <password> -gc <domain> -c all -ns <ip of domain>
echo "Domain: "
read domain
echo "Username: "
read username
echo "Password: "
read password
echo "IP of Domain: "
read ip_address
bloodhound-python -d $domain -u $username -p $password -gc $domain -c all -ns $ip_address
Sharphound
- C# Data Collector for BloodHound
Import-Module .\SharpHound.ps1
C:\Tools\SharpHound.exe -c All -d INLANEFREIGHT.LOCAL --zipfilename loot.zip
Invoke-Bloodhound -CollectionMethod All -Domain inlanefreight.local -ZipFileName loot.zip