# BloodHound

## SharpHound for BloodHound File Gathering (Mapping)

```
. .\\SharpHound.ps1
Invoke-BloodHound -CollectionMethod All -JSONFolder "C:\\Users\\pelly\\Downloads\\files\\"
```

## BloodHound (Post Exploitation and AD Mapping)

* <https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux>

## References:

* <https://github.com/BloodHoundAD/BloodHound/tree/master/Ingestors>
* <https://medium.com/@shatabda/security-csv-or-formula-injection-what-how-88cefba8e3df>
* <https://payatu.com/csv-injection-basic-to-exploit/>
