This blog post introduces our new custom queries for BloodHound Community Edition (CE) and explains how you can use them effectively to analyze your Active Directory infrastructure.| blog.compass-security.com
Collect data To collect data you need a tool called SharpHound.exe Download it from: https://github.com/BloodHoundAD/BloodHound/tree/master/Ingestors Run the following command with a normal "Domain User" to enumerate Group Membership, Trusts, ACLs, ObjectProps, Containers, and GPO Local Admins within a Domain: SharpHound.exe -c DCOnly When finished, a zip file should have been generated - example: 20200220204118_BloodHound.zip Database| wirzfamily.ch