☕
My OSCP Journey: Tips, Tricks, and Cheat Sheets
  • Introduction
  • Network Scan
  • Services Exploitation
    • 21 - FTP
    • 25, 465, 587 - SMTP
    • 53 - DNS
    • 88 - Kerberos
    • 80, 443 - HTTP/S
    • 110, 995 - POP
    • 111 - NFS/RPC
    • 135, 593 - MSRPC
    • 139, 445 - SMB
    • 143, 993 - IMAP
    • 161 - SNMP
    • 389, 636, 3268, 3269 - LDAP
    • 3306 - Mysql
    • 5432 - Postgres
    • 27017 - MongoDB
  • Web Application Attacks
    • SQL Injection
    • File Inclusion Vulnerabilty
    • Command Injection
    • Client-Side Attacks
  • Brute Forcing
  • Privilege Escalation
    • Manual Enumeration
      • Windows Enumeration
      • Linux Enumeration
    • Windows Privesc
    • Linux Privesc
  • Active Directory
    • AD Manual Enumeration
    • AD Automatic Enumeration
    • AD Authentication
    • AD Lateral Movement
    • AD Attacking Kerberos
    • Hash Cracking Techniques
  • Transfer Files
    • Windows Downloads
    • Windows Uploads
  • Shells
    • Reverse/Bind Shells
    • Web Shells
Powered by GitBook
On this page
  • Sharpound
  • BloodHound

Was this helpful?

Edit on GitHub
  1. Active Directory

AD Automatic Enumeration

PreviousAD Manual EnumerationNextAD Authentication

Last updated 1 year ago

Was this helpful?

Sharpound

There are two different Sharphound collectors:

SharpHound.ps1: PowerShell script for running Sharphound. However, the latest release of Sharphound has stopped releasing the Powershell script version. This version is good to use with RATs since the script can be loaded directly into memory, evading on-disk AV scans.

SharpHound.exe: a Windows executable version for running Sharphound.

Both are available here:

Run Sharphound using the All and Session collection methods:

cmd> Sharphound.exe --CollectionMethods All --Domain asd.domain.com --ExcludeDCs 

Once completed, you will have a timestamped ZIP file in the same folder you executed Sharphound from.

BloodHound

From Kali:

neo4j console start

In another Terminal tab, run:

bloodhound --no-sandbox # This will show you the authentication GUI

The default credentials for the neo4j database will be neo4j:neo4j

Drag and drop the ZIP file onto the Bloodhound GUI to import it.

Releases · BloodHoundAD/SharpHoundGitHub
Logo