Skip to main content
Glama
mwnickerson

BloodHound MCP Server

by mwnickerson

get_computer_sessions

Retrieve active domain sessions for a specific computer to identify lateral movement targets and analyze attack paths by examining cached credentials.

Instructions

Retrieves the active sessions of a specific computer within the domain. Active sessions are the current sessions that a computer has within the domain. These sessions can be used to identify potential targets for lateral movement and privilege escalation. These sessions can also be used to formulate and inform on attack paths because if a user has an active session on a host their credentials are cached in memory Args: computer_id: The ID of the computer to query limit: Maximum number of sessions to return (default: 100) skip: Number of sessions to skip for pagination (default: 0)

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
computer_idYes
limitNo
skipNo

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/mwnickerson/bloodhound_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server