# bloodhound-python

<pre data-overflow="wrap"><code><strong># This will gather data about the name server 172.16.5.5
</strong><strong># It will collect all of the
</strong>sudo bloodhound-python -u 'forend' -p 'Klmcargo2' -ns 172.16.5.5 -d inlanefreight.local -c all 

<strong># Then you can view the results with just ls command
</strong>ls -la
</code></pre>

After that we can also use the bloodhound GUI to see the visual representation of the network

<pre><code>sudo neo4j start

bloodhound

<strong># Then we will zip all of the json files from earlier
</strong>zip -r ilfreight_bh.zip *.json
</code></pre>

Then upload it into the gui

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FnhlurtxtIdOiDKMnKElN%2Fimage.png?alt=media&#x26;token=8ef52b25-9f6e-4242-8c85-4c081b7193ac" alt=""><figcaption></figcaption></figure>
