BloodHound CE Python Ingestor
Python-based ingestor for BloodHound Community Edition (CE) that collects Active Directory data. Built on Impacket and compatible only with BloodHound CE.
Description
bloodhound-ce-python is a Python tool designed to ingest data from Active Directory environments into BloodHound CE for analysis. It supports various collection methods to enumerate group memberships, local admins, sessions, trusts, and more, aiding in mapping attack paths in domain environments.
Use cases include red team engagements and security assessments where understanding AD relationships is crucial. The tool leverages Impacket for authentication and enumeration over SMB, LDAP, and other protocols, providing detailed data for BloodHound CE visualization.
It is specifically for BloodHound CE; legacy BloodHound versions require the separate bloodhound-python package. For issues, refer to the GitHub repository.
How It Works
The tool uses Impacket libraries to authenticate via Kerberos (default with fallback to NTLM) or other methods like hashes or tickets. It queries domain controllers for specified collection methods (e.g., Group, Session, Trusts) over LDAP, DNS, and RPC protocols. Data is gathered from DCs, optionally global catalogs, with configurable workers, pooling, and DNS options. Output is formatted for BloodHound CE import, excluding certain dynamic data like LoggedOn by default.
Installation
sudo apt install bloodhound-ce-pythonFlags
Examples
bloodhound-ce-python -hbloodhound-ce-python -u username -p password -c Default -d domain.combloodhound-ce-python -k -c All -d domain.combloodhound-ce-python --hashes lmhash:nthash -c Group,Session -d domain.combloodhound-ce-python -u user@domain.com -p pass -dc dc01.domain.com -ns 10.0.0.1bloodhound-ce-python -no-pass -k -c DCOM,RDP -d domain.combloodhound-ce-python --auth-method ntlm -u user -p pass -gc gc.domain.com