...
Write
OneWriteup
  • Login
  • Register
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to use Bloodhound / Sharphound for Pentesting Active Directory?

FOUNDER by FOUNDER
November 6, 2024
Reading Time: 12 mins read
64
0
How to use bloodhound tool for pentesting
Share on FacebookShare on Twitter

What is BloodHound?

BloodHound is a powerful open-source tool that helps with penetration testing in Active Directory environments. It allows security professionals to see and understand the relationships and permissions within Active Directory using an easy-to-navigate graphical interface. By visualizing these connections, BloodHound makes it simpler to spot potential vulnerabilities and assess the overall security of an organization.

What is SharpHound?

SharpHound is a data collection tool for bloodhound it uses Lightweight Directory Access Protocol (LDAP) to gather information about users, groups and services and their respective permission and permission between different AD objects.

 

 Installing and running BloodHound in Linux.

Step 1 : Install BloodHound – Open your terminal and install Bloodhound using the following command:

sudo apt install bloodhound

 

How to use Bloodhound / Sharphound for testing Active Directory

Step 2 : Start Neo4j Service – Once the installation is complete, you need to start the Neo4j service. In your terminal, run:

sudo neo4j console

How to use Bloodhound / Sharphound for testing Active Directory?

Step 3 : Access the Neo4j Interface

  • Open your browser and navigate to: http://localhost:7474/
  • Use the default credentials to log in:
    • Username: neo4j
    • Password: neo4j

How to use Bloodhound / Sharphound for testing Active Directory?

Step 4 : Update Your Password – You will be prompted to change the default password. Make sure to set a secure, memorable password, as you’ll use it to log into Bloodhound.

How to use Bloodhound / Sharphound for testing Active Directory?

Step 5  : Run BloodHound – To launch Bloodhound, open a new terminal window and execute:

bloodhound

How to use Bloodhound / Sharphound for testing Active Directory?

Step 6 : Login to Bloodhound  – Login in bloodhound using the updated password.

 

Collecting Data Using SharpHound for BloodHound Analysis

Bloodhound uses data collected by SharpHound to analyze and visualize Active Directory environments. Follow the steps below based on your access type (GUI or CLI).

ADVERTISEMENT

Download SharpHound

You can download SharpHound from the official BloodHound GitHub repository: Download SharpHound

Data Collection Methods

1. Using GUI Access

If you have GUI access to a machine connected to the Active Directory environment:

  1. Locate and double-click SharpHound.exe.

  2. The collected data will be automatically stored in the same directory as SharpHound.exe.

2. Using CLI Access (e.g., SSH)
NOTE: Make sure that SharpHound.ps1 is on same directory.

If you are accessing the machine using SSH or a command-line interface:

  1. Open PowerShell:
    powershell

 

  • Set the Execution Policy:
    Set-ExecutionPolicy -ExecutionPolicy Unrestricted

  • Load SharpHound PowerShell Script:
    . .\SharpHound.ps1
  • Run SharpHound to Collect Data: Replace home.local with your domain name.
    Invoke-BloodHound -CollectionMethod All -Domain CONTROLLER.local -ZipFileName loot.zip

 

Collecting Data with Evil-WinRM or PowerShell for Linux

If you are using Evil-WinRM or PowerShell on a Linux system:

  1. Set the Execution Policy:
    Set-ExecutionPolicy -ExecutionPolicy Unrestricted

  2. Load SharpHound PowerShell Script:
    . .\SharpHound.ps1

 

  • Run SharpHound with Credentials: Replace <UserName>, <Password>, and <PathToFile> with your details.Invoke-BloodHound -CollectionMethod All -LdapUsername <UserName> -LdapPassword <Password> -OutputDirectory <PathToFile>

 

OR 

. .\SharpHound.ps1

Invoke-BloodHound -CollectionMethod All –LdapUsername <UserName> –LdapPassword <Password> –OutputDirectory <PathToFile

 

Visualizing data collected by SharpHound on BloodHound.

Step 1. Upload the zip file created by SharpHound on BloodHound tool.

 

Wait until the upload is completed.

bloodhound tool

You can now see and understand the relationships and permissions within Active Directory using an easy-to-navigate graphical interface.

Complete Video Walkthrough:

 

Read similar articles : 

How to perform Golden Ticket Attack in Active Directory in 2024?

 

ADVERTISEMENT
FOUNDER

FOUNDER

Cybersecurity aficionado committed to disseminating expertise, crafting articles that empower others to resolve errors and fortify online defenses with ease.

Recently Posted

HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

November 15, 2024
743
Top 4 Cyber attacks Commonly used for Hacking Websites!

Top 4 Cyber attacks Commonly used for Hacking Websites!

November 9, 2024
168
Pass The Hash

How to perform Pass The Hash Attack on Active Directory in 2024?

November 2, 2024
153
DC Sync Attack

How to perform DC Sync Attack in Active Directory?

November 2, 2024
133
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Recommended

The Ultimate Guide: The SuperPower Of Google Dorking

The Ultimate Guide: The SuperPower Of Google Dorking

July 18, 2024
123
Hackyx.io

Hackyx: Search Engine for Cybersecurity

May 14, 2024
109

Popular Story

  • Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    827 shares
    Share 331 Tweet 207
  • Top 10 Ethical Hacking and Exam Prep Books: including free PDF links

    82 shares
    Share 33 Tweet 21
  • Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

    134 shares
    Share 54 Tweet 34
  • Top Cyber Security VAPT Interview Preparation Questions in 2024

    87 shares
    Share 35 Tweet 22
  • How To Create Your Open Source SIEM Home Lab?

    131 shares
    Share 52 Tweet 33
ADVERTISEMENT
OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • OneWriteup Labs
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login
  • Sign Up

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.