Search

Home

PNPT Studies

PJPT Studies

AD CS / Certificate Attacks (ESC1-15) (1, 8, 11 for now)

Report Writing / Client Presentation

Operationalizing Cybercrime Data (June 2025)

Domain Enum with Bloodhound

We need neo4j first:

sudo neo4j console
image

It creates “Bold enabled on localhost:7687” and gives us a clickable link for remote interface. Click on it!

login to neo4j

run bloodhound

sudo bloodhound

login using neo4j creds

run bloodhound ingesters:

FIX:

mv 20231005021847_bloodhound.zip /home/kali/bloodhound
cd /home/kali/bloodhound
ls
unzip 2023 tab

#sudo python3 /home/kali/.local/pipx/venvs/crackmapexec/bin/bloodhound-python -d MARVEL.local -u fcastle -p Password1 -ns 192.168.218.136 -c all

-d for domain

-u for user found earlier

-p for password we cracked

-ns for name server, the domain controller

-c for what we are collecting. All for all data that we possibly can.

Upload jsons to the bloodhound sesh opened earlier

You can visualize the network and perms. You can mark targets as owned and see shortest path to domain admin/controller!