BloodHound
Ingestors
BloodHound
BloodHound is a graphical tool that visualizes Active Directory relationships and permissions to identify attack paths and privilege escalation opportunities in enterprise environments. Once the data is collected via SharpHound, we can upload the .zip
file to BloodHound.
BloodHound used neo4j
, a graph database that stores data as nodes and relationships—perfect for mapping complex AD environments. The default Neo4j credentials are neo4j:neo4j
.
Custom cypher queries: BloodHound Queries For All.
Bloodhound automation automatically runs and populates a new instance of BH CE:
# Create & start a project
./bloodhound-automation.py start -bp 10001 -np 10501 -wp 8001 my_project
# Import data
./bloodhound-automation.py data -z test.zip my_project
# Delete & clear data
./bloodhound-automation.py delete my_project
./bloodhound-automation.py clear my_project
AD-miner
AD Miner is an Active Directory auditing tool (supporting both on-prem and Entra ID) that analyzes BloodHound data in a Neo4j database using Cypher queries. It generates a static, web-based report highlighting AD weaknesses with dynamic graphs, risk ratings, historical indicators, and detailed mitigation paths. It requires a Neo4j database populated with AD data from tools like SharpHound, RustHound-CE, BloodHound.py, or AzureHound.
For optimal performance, BloodHound Automation is recommended, as it installs the Graph Data Science plugin—enabling faster analysis and smarter pathfinding compared to default BloodHound setups.
Basic usage:
AD-miner -cf My_Report -u neo4j -p mypassword
Resources
A nice demo of how to use Bloodhound (video)
Last updated
Was this helpful?