Bloodhound
Bloodhound Usage

Linux
Rusthound
The most opsec
rusthound -d "$DOMAIN" -u "$USER"@"$DOMAIN" -p "$PASSWORD" --zip --ldaps --adcs --old-bloodhound
NXC
nxc ldap <ip> -u user -p pass --bloodhound --collection All
nxc ldap 192.168.1.48 -u raj -p Password@1 --bloodhound --collection All --dns-server 192.168.1.48
Bloodhound.py
To get all data in Bloodhound, use SharpHond.exe - Exegol compatible version https://github.com/BloodHoundAD/SharpHound/releases/download/v1.0.4/SharpHound-v1.0.4.zip
Bloodhound.py don't get all data, probably because of DNS resolution
With password
$ sudo bloodhound-python -u 'forend' -p 'Klmcargo2' -ns 172.16.5.5 -d inlanefreight.local -c all
INFO: Found AD domain: inlanefreight.local
INFO: Connecting to LDAP server: ACADEMY-EA-DC01.INLANEFREIGHT.LOCAL
INFO: Found 1 domains
INFO: Found 2 domains in the forest
INFO: Found 564 computers
INFO: Connecting to LDAP server: ACADEMY-EA-DC01.INLANEFREIGHT.LOCAL
INFO: Found 2951 users
INFO: Connecting to GC LDAP server: ACADEMY-EA-DC01.INLANEFREIGHT.LOCAL
INFO: Found 183 groups
INFO: Found 2 trusts
INFO: Starting computer enumeration with 10 workers
Timeout errors - add dns-tcp
bloodhound.py --zip -c All -d "INLANEFREIGHT.LOCAL" -u "forend" -p "Klmcargo2" -ns "172.16.5.5" --dns-tcp
Even better
$ cat /etc/resolv.conf
# Generated by Docker Engine.
# This file can be edited; Docker Engine will not make further changes once it
# has been modified.
nameserver 127.0.0.53
search lan
options edns0 trust-ad
# Based on host file: '/etc/resolv.conf'
# Overrides: []
domain FREIGHTLOGISTICS.LOCAL
nameserver 172.16.5.238
bloodhound.py --zip -c All -d FREIGHTLOGISTICS.LOCAL -ns 172.16.5.238 -c All -u forend@inlanefreight.local -p Klmcargo2 --dns-tcp
INFO: Found AD domain: freightlogistics.local
INFO: Getting TGT for user
With Kerberos (ccache)
# export KRB5CCNAME=krb5cc.florence.ramirez
# bloodhound.py --zip -c All -d "domain.htb" -u "florence.ramirez" -k -ns 10.10.11.24
Password:
LDAPSearch - Avoid Detection
proxychains ldapsearch -LLL -H ldap://dc03.eu-ifrit.vl -D 'EU-IFRIT\Grace.Dunn' -w 'PenEuIfrit527#' -b "DC=EU-IFRIT,DC=VL" -N -o ldif-wrap=no -E '!1.2.840.113556.1.4.801=::MAMCAQc=' "(&(objectClass=*))" | tee objects.txt
# git clone https://github.com/fortalice/bofhound
# cd bofhound
# pip install .
# cd ..
# wget https://gist.githubusercontent.com/kozmer/725cde788e4b3c8bdd870468c243916b/raw/a797b4020bef960124d79d7295cb6ad1849b47a1/ldapsearch_parser.py
# python3 ldapsearch_parser.py objects.txt object-conv.txt
# bofhound -i object-conv.txt

JSON files can be ingest int o Bloodhound and we now have ACLs
Can also see:
Windows
Sharphound.exe
For Exegol compatible version: https://github.com/BloodHoundAD/SharpHound/releases/download/v1.0.4/SharpHound-v1.0.4.zip
PS C:\htb> .\SharpHound.exe -c All --zipfilename ILFREIGHT
# removes noisy collection methods like RDP, DCOM, PSRemote and LocalAdmin
SharpHound.exe –-steatlh
Sharphound.ps1
C:\AD\Tools\BloodHound-master\Collectors\SharpHound.ps1
Invoke-BloodHound -CollectionMethod All
# removes noisy collection methods like RDP, DCOM, PSRemote and LocalAdmin
Invoke-BloodHound –Steatlh
# avoid detections like MDI
Invoke-BloodHound -ExcludeDCs
SOAPHound
ShadowHound
2 options: ADWS or LDAP
# 1/
ShadowHound-ADM -OutputFilePath "C:\Résultats\output.txt"
# 2/
python3 bofhound.py -i output.txt -p All

ADExplorer64 - Avoid Detection
ADExplorer64.exe is a sysinternal signed binary
C:\Windows\Temp\
is a default AppLocker Exclusion Path
Z:\>copy C:\Users\Grace.Dunn\Desktop\ADExplorer64.exe C:\Windows\Temp\
Overwrite C:\Windows\Temp\ADExplorer64.exe? (Yes/No/All): Yes
1 file(s) copied.
Z:\>C:\Windows\Temp\ADExplorer64.exe

File -> Create a Snapshot


Parse the snapshot to ingest it in Bloodhound
[Jan 18, 2025 - 07:04:10 (EST)] exegol-default ADExplorerSnapshot.py # vim adexpsnapshot/__init__.py
Change self.preprocessCached() by self.preprocess()

python3 ADExplorerSnapshot.py ../snapshot.dat

Can now be used in Bloodhound
It doesn't include ACL datas
To get ACL datas see LDAPSearch
Run Bloodhound

Then upload zip file generate from Sharphound or bloodhound-python
Bloodhound-quickwin
bloodhound-quickwin -u neo4j -p exegol4thewin
AD Miner
Autobloody
Bloodhound Query Library
Interesting Book
Interesting BooksPentesting Active Directory and Windows-based Infrastructure Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec considerations
Infrastructure Attack Strategies for Ethical Hacking Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory.
RTFM: Red Team Field Manual v2 A quick reference when there is no time to scour the Internet for that perfect command
Red Team Development and Operations: A practical guide The authors have moved beyond SANS training and use this book to detail red team operations in a practical guide.
Cybersecurity Attacks – Red Team Strategies A practical guide to building a penetration testing program having homefield advantage
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated