BloodHound
BloodHound is a powerful Active Directory (AD) enumeration tool used by penetration testers and red teamers to identify and visualize relationships and permissions within a Windows domain. It helps uncover hidden paths to privilege escalation and lateral movement by mapping out how users, groups, computers, and permissions interact.
What BloodHound Does
BloodHound uses graph theory to analyze AD environments. It collects data on users, groups, computers, sessions, trusts, ACLs (Access Control Lists), and more, then builds a graph showing how an attacker could move through the network to gain elevated privileges.
Key Features
- Visual Graph Interface: Displays relationships between AD objects in an intuitive, interactive graph.
- Attack Path Discovery: Identifies paths like “Shortest Path to Domain Admin” or “Users with Kerberoastable SPNs.”
- Custom Queries: Supports Cipher queries (from Neo4j) to search for specific conditions or relationships.
- Data Collection: Uses tools like SharpHound (its data collector) to gather information from the domain.
How BloodHound Works
1. Data Collection
- SharpHound collects data via:
- LDAP queries
- SMB enumeration
- Windows API calls
- It can run from a domain-joined machine with low privileges.
2. Data Ingestion
- The collected data is saved in JSON format and imported into BloodHound’s Neo4j database.
3. Graph Analysis
- BloodHound visualizes the domain structure and highlights potential attack paths.
Common Attack Paths Identified
- Kerberoasting: Finding service accounts with SPNs that can be cracked offline.
- ACL Abuse: Discovering users with write permissions over other users or groups.
- Session Hijacking: Identifying computers where privileged users are logged in.
- Group Membership Escalation: Finding indirect paths to privileged groups.
Use Cases
- Red Team Operations: Mapping out attack paths and privilege escalation strategies.
- Blue Team Defense: Identifying and remediating risky configurations.
- Security Audits: Understanding AD structure and permissions.
Defensive Measures
- Limit excessive permissions and group memberships.
- Monitor for SharpHound activity.
- Use tiered administrative models.
- Regularly audit ACLs and session data.