bloodhound_ingest
Extract Active Directory data using NetExec for Bloodhound analysis to identify attack paths and security vulnerabilities during penetration testing.
Instructions
use the netexec's bloodhound feature to extract the json data to be uploaded to bloodhound database
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| ips | Yes | ||
| username | Yes | ||
| password | Yes | ||
| ntlm | No | ||
| kerberos | No |
Implementation Reference
- src/pentestmcp/server.py:311-319 (handler)The main handler function for the 'bloodhound_ingest' tool. It is registered via the @mcp.tool decorator and executes netexec ldap command with bloodhound collection options using NTLM or Kerberos authentication as specified.@mcp.tool(name="bloodhound_ingest",description="use the netexec's bloodhound feature to extract the json data to be uploaded to bloodhound database") def bloodhound_ingest(ips:List[str],username:str,password:str,ntlm:bool=False,kerberos:bool=False): if (ntlm): return run_command(["netexec","ldap"]+ips+["-u",username,"-H",password,"--bloodhound","--collection","all"]) elif(kerberos): return run_command(["netexec","ldap"]+ips+["-u",username,"-p",password,'-k',"--bloodhound","--collection","all"]) else: return run_command(["netexec","ldap"]+ips+["-u",username,"-p",password,"--bloodhound","--collection","all"])