# BloodHound

## Installing BloodHound

It is surprising easy to install bloodhound these days from Kali Linux:

{% code title="attacker\@kali" %}

```csharp
apt-get install bloodhound
```

{% endcode %}

Part of the installation process, neo4j database management solution that is required for BloodHound will also be installed that will need to be configured.

## Configuring BloodHound

Once the installation is complete, we need to configure neo4j - mainly just change default passwords, so let's run:

{% code title="attacker\@kali" %}

```csharp
neo4j console
```

{% endcode %}

and navigate to <http://localhost:7474/> to set up a DB user account by changing default passwords from **neo4j:neo4j** to something else - we will need those credentials when launching BloodHound itself.

## Running BloodHound

{% code title="attacker\@kali" %}

```
bloodhound
```

{% endcode %}

Login with your previously set credentials from neo4j

***

## bloodhound-python <a href="#bloodhoundpy" id="bloodhoundpy"></a>

### How to install

```
sudo apt install bloodhound.py
```

How to Use

```
bloodhound-python -u bob -d evil.corp -p 'Password123' -c all
```

```
bloodhound-python -u bob -d evil.corp -p 'Password123' -c all -dc 192.168.0.1
```

```
bloodhound-python -u bob -d evil.corp -p 'Password123' -c all
```

***

## Bloohound.py

### How to Install

```
git clone https://github.com/dirkjanm/BloodHound.py

cd BloodHound.py/
```

### Usage

```
python3 bloodhound.py -d evil.corp -u bob -p 'Password123!' -c all
```

```
python3 bloodhound.py -d evil.corp -u bob -p 'Password123!' -c all -dc 192.168.1.2
```

{% code overflow="wrap" %}

```
python3 bloodhound.py -d evil.corp -u bob -p 'Password123!' -c all -dc DC1.evil.corp -gc DC1.evil.corp
```

{% endcode %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://wiki.smhuda.com/pentesting/infrastructure-security/network-infrastructure/bloodhound.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
