Domain Enumeration With BloodHound
Last updated
Last updated
BloodHound is a fantastic application to visualize the relationships the objects in the domain have with each other. I will not go into any detail here. You can go to the to learn more.
I should note that this may be something you might want to avoid using if you are in a Red Team engagement as creating the data will produce a lot of noise.
I use the SharpHound.ps1 ingestor script which can be found .
You can replace 'Invoke-Bloodhound' with SharpHound.exe if you are using that instead.
Note: You may have to use '-CollectionMethod LoggedOn' because it sometimes misses sessions.
If you wish to avoid Advanced Threat Analytics (ATA) detection, use '-ExcludeDC'
Using from linux