# This will gather data about the name server 172.16.5.5
# It will collect all of the
sudo bloodhound-python -u 'forend' -p 'Klmcargo2' -ns 172.16.5.5 -d inlanefreight.local -c all
# Then you can view the results with just ls command
ls -la
After that we can also use the bloodhound GUI to see the visual representation of the network
sudo neo4j start
bloodhound
# Then we will zip all of the json files from earlier
zip -r ilfreight_bh.zip *.json