BloodHound maps Active Directory attack paths using graph theory to find privilege escalation routes.
bloodhound-python -u user -p password -d domain.local -dc DC01.domain.local -c All
bloodhound-python -u user -p password -d domain.local -c All --zip
bloodhound-python -u user -p password -d domain.local -c DCOnly
bloodhound-python -u user -p password -d domain.local -c All --dns-tcp -ns 10.10.10.1
./SharpHound.exe -c All
./SharpHound.exe -c All --zipfilename loot.zip
./SharpHound.exe -c SessionLoop --loopcollection --loopinterval 00:05:00 --loopduration 02:00:00
nxc ldap DC01 -u user -p pass --bloodhound -c All -ns 10.10.10.1
MATCH (u:User {admincount:true}) RETURN u
MATCH p=shortestPath((u:User)-[*1..]->(g:Group {name:"DOMAIN [email protected]"})) RETURN p
MATCH p=shortestPath((u:User {name:"[email protected]"})-[*1..]->(g:Group {name:"DOMAIN [email protected]"})) RETURN p
MATCH (u:User) WHERE u.hasspn=true RETURN u.name
MATCH (u:User) WHERE u.dontreqpreauth=true RETURN u.name
MATCH (c:Computer) WHERE c.unconstraineddelegation=true RETURN c.name
MATCH (u:User) WHERE u.enabled=true AND u.lastlogon < (datetime().epochseconds - (90*86400)) RETURN u.name ORDER BY u.lastlogon
MATCH (g:Group) WHERE g.name =~ ".*ADMIN.*" RETURN g.name
sudo neo4j start && bloodhound
sudo neo4j console
pip3 install bloodhound