exploiting-active-directory-with-bloodhound
BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac
Best use case
exploiting-active-directory-with-bloodhound is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac
Teams using exploiting-active-directory-with-bloodhound should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/exploiting-active-directory-with-bloodhound/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How exploiting-active-directory-with-bloodhound Compares
| Feature / Agent | exploiting-active-directory-with-bloodhound | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
SKILL.md Source
# Exploiting Active Directory with BloodHound > **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws. ## Overview BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attack paths from compromised accounts to high-value targets such as Domain Admins, identifying privilege escalation chains that would be nearly impossible to find manually. SharpHound is the official data collector that gathers AD objects, relationships, ACLs, sessions, and group memberships. ## When to Use - When performing authorized security testing that involves exploiting active directory with bloodhound - When analyzing malware samples or attack artifacts in a controlled environment - When conducting red team exercises or penetration testing engagements - When building detection capabilities based on offensive technique understanding ## Prerequisites - Familiarity with red teaming concepts and tools - Access to a test or lab environment for safe execution - Python 3.8+ with required dependencies installed - Appropriate authorization for any testing activities ## Objectives - Collect Active Directory relationship data using SharpHound or BloodHound.py - Visualize attack paths from compromised accounts to Domain Admin - Identify misconfigured ACLs, group memberships, and delegation settings - Discover shortest attack paths to high-value targets - Map Kerberos delegation configurations for abuse - Document all identified privilege escalation chains ## MITRE ATT&CK Mapping - **T1087.002** - Account Discovery: Domain Account - **T1069.002** - Permission Groups Discovery: Domain Groups - **T1482** - Domain Trust Discovery - **T1615** - Group Policy Discovery - **T1018** - Remote System Discovery - **T1033** - System Owner/User Discovery - **T1016** - System Network Configuration Discovery ## Workflow ### Phase 1: Data Collection with SharpHound 1. Transfer SharpHound collector to compromised host 2. Execute collection with appropriate method (All, DCOnly, Session, LoggedOn) 3. Collect from all reachable domains if multi-domain environment 4. Exfiltrate ZIP data files to analysis workstation 5. Import data into BloodHound CE or Legacy ### Phase 2: Attack Path Analysis 1. Mark owned principals (compromised accounts) 2. Query shortest path to Domain Admins 3. Identify Kerberoastable accounts with admin privileges 4. Find AS-REP Roastable accounts 5. Analyze ACL-based attack paths (GenericAll, GenericWrite, WriteDACL, ForceChangePassword) 6. Review GPO abuse opportunities ### Phase 3: Exploitation Planning 1. Prioritize attack paths by complexity and stealth 2. Identify required tools for each step in the chain 3. Plan OPSEC considerations for each technique 4. Execute identified attack chain 5. Document evidence at each step ## Tools and Resources | Tool | Purpose | Platform | |------|---------|----------| | BloodHound CE | Graph visualization and analysis | Web-based | | SharpHound | AD data collection (.NET) | Windows | | BloodHound.py | AD data collection (Python) | Linux/Windows | | Cypher queries | Custom graph queries | Neo4j/BloodHound | | PlumHound | Automated BloodHound reporting | Python | | Max (BloodHound) | BloodHound automation | Python | ## Key BloodHound Queries | Query | Purpose | |-------|---------| | Shortest Path to Domain Admins | Find fastest route to DA | | Find Kerberoastable Users with Path to DA | SPN accounts leading to DA | | Find AS-REP Roastable Users | Accounts without pre-auth | | Shortest Path from Owned Principals | Paths from compromised accounts | | Find Computers with Unsupported OS | Legacy systems for exploitation | | Find Users with DCSync Rights | Accounts that can replicate AD | | Find GPOs that Modify Local Group Membership | GPO-based privilege escalation | ## Validation Criteria - [ ] SharpHound data collected from all domains - [ ] Attack paths identified from owned accounts to DA - [ ] ACL-based attack paths documented - [ ] Kerberoastable and AS-REP roastable accounts identified - [ ] Exploitation plan created with prioritized paths - [ ] Evidence screenshots captured for report
Related Skills
performing-directory-traversal-testing
Testing web applications for path traversal vulnerabilities that allow reading or writing arbitrary files on the server by manipulating file path parameters.
performing-active-directory-vulnerability-assessment
Assess Active Directory security posture using PingCastle, BloodHound, and Purple Knight to identify misconfigurations, privilege escalation paths, and attack vectors.
performing-active-directory-penetration-test
Conduct a focused Active Directory penetration test to enumerate domain objects, discover attack paths with BloodHound, exploit Kerberos weaknesses, escalate privileges via ADCS/DCSync, and demonstrate domain compromise.
performing-active-directory-forest-trust-attack
Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.
performing-active-directory-compromise-investigation
Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.
performing-active-directory-bloodhound-analysis
Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised users to Domain Admin.
exploiting-zerologon-vulnerability-cve-2020-1472
Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller compromise by resetting the machine account password to empty.
exploiting-websocket-vulnerabilities
Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure message handling during authorized security assessments.
exploiting-vulnerabilities-with-metasploit-framework
The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7. It contains over 2,300 exploits, 1,200 auxiliary modules, and 400 post-exploitation modules
exploiting-type-juggling-vulnerabilities
Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent hash verification, and manipulate application logic through type coercion attacks.
exploiting-template-injection-vulnerabilities
Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker, and other template engines to achieve remote code execution.
exploiting-sql-injection-with-sqlmap
Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized penetration tests.