Write
OneWriteup
  • Login
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to use Bloodhound / Sharphound for Pentesting Active Directory?

FOUNDER by FOUNDER
August 19, 2025
Reading Time: 12 mins read
88
0
How to use bloodhound tool for pentesting
Share on FacebookShare on Twitter

What is BloodHound?

BloodHound is a powerful open-source tool that helps with penetration testing in Active Directory environments. It allows security professionals to see and understand the relationships and permissions within Active Directory using an easy-to-navigate graphical interface. By visualizing these connections, BloodHound makes it simpler to spot potential vulnerabilities and assess the overall security of an organization.

What is SharpHound?

SharpHound is a data collection tool for bloodhound it uses Lightweight Directory Access Protocol (LDAP) to gather information about users, groups and services and their respective permission and permission between different AD objects.

 

 Installing and running BloodHound in Linux.

Step 1 : Install BloodHound – Open your terminal and install Bloodhound using the following command:

sudo apt install bloodhound

 

How to use Bloodhound / Sharphound for testing Active Directory

Step 2 : Start Neo4j Service – Once the installation is complete, you need to start the Neo4j service. In your terminal, run:

sudo neo4j console

How to use Bloodhound / Sharphound for testing Active Directory?

Step 3 : Access the Neo4j Interface

  • Open your browser and navigate to: http://localhost:7474/
  • Use the default credentials to log in:
    • Username: neo4j
    • Password: neo4j

How to use Bloodhound / Sharphound for testing Active Directory?

Step 4 : Update Your Password – You will be prompted to change the default password. Make sure to set a secure, memorable password, as you’ll use it to log into Bloodhound.

How to use Bloodhound / Sharphound for testing Active Directory?

Step 5  : Run BloodHound – To launch Bloodhound, open a new terminal window and execute:

bloodhound

How to use Bloodhound / Sharphound for testing Active Directory?

Step 6 : Login to Bloodhound  – Login in bloodhound using the updated password.

 

Collecting Data Using SharpHound for BloodHound Analysis

Bloodhound uses data collected by SharpHound to analyze and visualize Active Directory environments. Follow the steps below based on your access type (GUI or CLI).

Download SharpHound

You can download SharpHound from the official BloodHound GitHub repository: Download SharpHound

Data Collection Methods

1. Using GUI Access

If you have GUI access to a machine connected to the Active Directory environment:

  1. Locate and double-click SharpHound.exe.

  2. The collected data will be automatically stored in the same directory as SharpHound.exe.

2. Using CLI Access (e.g., SSH)
NOTE: Make sure that SharpHound.ps1 is on same directory.

If you are accessing the machine using SSH or a command-line interface:

  1. Open PowerShell:
    powershell

 

  • Set the Execution Policy:
    Set-ExecutionPolicy -ExecutionPolicy Unrestricted

  • Load SharpHound PowerShell Script:
    . .\SharpHound.ps1
  • Run SharpHound to Collect Data: Replace home.local with your domain name.
    Invoke-BloodHound -CollectionMethod All -Domain CONTROLLER.local -ZipFileName loot.zip

 

Collecting Data with Evil-WinRM or PowerShell for Linux

If you are using Evil-WinRM or PowerShell on a Linux system:

  1. Set the Execution Policy:
    Set-ExecutionPolicy -ExecutionPolicy Unrestricted

  2. Load SharpHound PowerShell Script:
    . .\SharpHound.ps1

 

  • Run SharpHound with Credentials: Replace <UserName>, <Password>, and <PathToFile> with your details.Invoke-BloodHound -CollectionMethod All -LdapUsername <UserName> -LdapPassword <Password> -OutputDirectory <PathToFile>

 

OR 

. .\SharpHound.ps1

Invoke-BloodHound -CollectionMethod All –LdapUsername <UserName> –LdapPassword <Password> –OutputDirectory <PathToFile

 

Visualizing data collected by SharpHound on BloodHound.

Step 1. Upload the zip file created by SharpHound on BloodHound tool.

 

Wait until the upload is completed.

bloodhound tool

You can now see and understand the relationships and permissions within Active Directory using an easy-to-navigate graphical interface.

Complete Video Walkthrough:

 

Read similar articles : 

How to perform Golden Ticket Attack in Active Directory in 2025?

Disclaimer: This blog is for educational purposes only, promoting awareness of ethical hacking and cybersecurity to help readers protect against cyber threats. All content is based on lawful experiments on our own systems. No illegal activities are endorsed. Users agree to apply the information responsibly and legally. The blog and author are not liable for any misuse. By using this blog, you agree to use all knowledge ethically and legally. [Read full disclaimer].

 

FOUNDER

FOUNDER

Cybersecurity aficionado committed to disseminating expertise, crafting articles that empower others to resolve errors and fortify online defenses with ease.

Recently Posted

Beginner’s Guide to Reverse Engineering Malware with dnSpy

Beginner’s Guide to Reverse Engineering Malware with dnSpy.

August 19, 2025
124
DNS Based Data Exfiltration Using Burp Collaborator Client

DNS Based Data Exfiltration Using Burp Collaborator Client

August 19, 2025
134
Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

August 19, 2025
741
HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

August 19, 2025
868
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Golden Ticket Attack

How to perform Golden Ticket Attack in Active Directory in 2025?

August 19, 2025
177
How To Create Vulnerable Active Directory HomeLab for Penetration Testing?

How To Create Vulnerable Active Directory HomeLab for Penetration Testing?

August 19, 2025
260

Popular Story

  • Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

    Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

    133 shares
    Share 53 Tweet 33
  • Beginner’s Guide to Reverse Engineering Malware with dnSpy.

    22 shares
    Share 9 Tweet 6
  • How to Configure OpenVPN Server for Multi Clients Setup in Windows?

    49 shares
    Share 20 Tweet 12
  • Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

    156 shares
    Share 62 Tweet 39
  • Top Cyber Security VAPT Interview Preparation Questions in 2024

    99 shares
    Share 40 Tweet 25

Support This Write-Up. Fund the Next

OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • Disclaimer
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In