This talk will serve as a persistent, canonical reference for all things BloodHound. From “head to tail”, we will use war stories and several live demos to explain every current aspect of and feature in the tool, the attack primitives tracked by the graph database, and how users can go beyond the tool and use cypher to perform even more advanced attack-path analysis during their penetration tests and red team engagements. Attendees will walk away with new skills for attacking Active Directory even more effectively, and going forward, we will reference the video of the talk whenever someone needs to see a demonstration for a feature of BloodHound, an attack primitive, or how to perform more advanced analysis outside the interface.