HackTricks
Search…
Pentesting
Powered By GitBook
BloodHound

What is BloodHound

BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4jdatabase fed by a PowerShell ingestor.
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.
BloodHound is developed by @_wald0, @CptJesus, and @harmj0y.
So, Bloodhound is an amazing tool which can enumerate a domain automatically, save all the information, find possible privilege escalation paths and show all the information using graphs.
Booldhound is composed of 2 main parts: The ingestors and the visualisation application. The ingestors are called SharpHound and are the applications (PS1 and C# exe) used to enumerate the domain and extract all the information in a format that the visualisation application will understand. The visualisation application uses neo4j to show how all the information is related and to show different ways to escalate privileges in the domain.

Installation

You can download the Ingestors from the github.
To install the visualisation application you will need to install neo4j and the bloodhound application. The easiest way to do this is just doing:
1
apt-get install bloodhound
Copied!
But, at the time of this writing, this wont install the latest bloodhound, so you may need to download a pre-compiled bloodhound latest version from: https://github.com/BloodHoundAD/BloodHound/releases or compile it from the source. You can download the community version of neo4j from here.
If you download by your own bloodhound from releases and neo4j from the web page (instead of using apt-get) you will need to decompress the downloaded files to access the executables.

Visualisation app Execution

After downloading/installing the required applications, lets start them. First of all you need to start the neo4j database:
1
./bin/neo4j start
2
#or
3
service neo4j start
Copied!
The first time that you start this database you will need to access http://localhost:7474/browser/. You will be asked default credentials (neo4j:neo4j) and you will be required to change the password, so change it and don't forget it.
Now, start the bloodhound application:
1
./BloodHound-linux-x64
2
#or
3
bloodhound
Copied!
You will be prompted for the database credentials: neo4j:<Your new password>
And bloodhound will be ready to ingest data.

Ingestors

Windows

You can download the Ingestors from the github. They have several options but if you want to run SharpHound from a PC joined to the domain, using your current user and extract all the information you can do:
1
./SharpHound.exe --CollectionMethod All
2
Invoke-BloodHound -CollectionMethod All
Copied!
If you wish to execute SharpHound using different credentials you can create a CMD netonly session and run SharpHound from there:
1
runas /netonly /user:domain\user "powershell.exe -exec bypass"
Copied!
You could also use other parameters like: DomainController, Domain, LdapUsername, LdapPassword...

Python

If you have domain credentials you can run a python bloodhound ingestor from any platform so you don't need to depend on Windows. Download it from https://github.com/fox-it/BloodHound.py or doing pip3 install bloodhound
1
bloodhound-python -u support -p '#00^BlackKnight' -ns 10.10.10.192 -d blackfield.local -c all
Copied!
Last modified 9mo ago