Skip to main content
Glama

bloodhound_ingest

Extract Active Directory data using NetExec for Bloodhound analysis to identify attack paths and security vulnerabilities during penetration testing.

Instructions

use the netexec's bloodhound feature to extract the json data to be uploaded to bloodhound database

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
ipsYes
usernameYes
passwordYes
ntlmNo
kerberosNo

Implementation Reference

  • The main handler function for the 'bloodhound_ingest' tool. It is registered via the @mcp.tool decorator and executes netexec ldap command with bloodhound collection options using NTLM or Kerberos authentication as specified.
    @mcp.tool(name="bloodhound_ingest",description="use the netexec's bloodhound feature to extract the json data to be uploaded to bloodhound database") def bloodhound_ingest(ips:List[str],username:str,password:str,ntlm:bool=False,kerberos:bool=False): if (ntlm): return run_command(["netexec","ldap"]+ips+["-u",username,"-H",password,"--bloodhound","--collection","all"]) elif(kerberos): return run_command(["netexec","ldap"]+ips+["-u",username,"-p",password,'-k',"--bloodhound","--collection","all"]) else: return run_command(["netexec","ldap"]+ips+["-u",username,"-p",password,"--bloodhound","--collection","all"])

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/YoussefSahnoun/PentestMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server