BloodHound
BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.
Ingestion
The ingestion has already been made by PEAS’s built-in SharpHound
*Evil-WinRM* PS C:\tmp> download cerberus.local_20240117101133_BloodHound.zip
Info: Downloading C:\tmp\cerberus.local_20240117101133_BloodHound.zip to cerberus.local_20240117101133_BloodHound.zip
Info: Download successful!
Downloading the ingested domain data to Kali
Prep
┌──(kali㉿kali)-[~/…/htb/labs/cerberus/bloodhound]
└─$ sudo neo4j console
directories in use:
home: /usr/share/neo4j
config: /usr/share/neo4j/conf
logs: /usr/share/neo4j/logs
plugins: /usr/share/neo4j/plugins
import: /usr/share/neo4j/import
data: /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses: /usr/share/neo4j/licenses
run: /usr/share/neo4j/run
Starting Neo4j.
┌──(kali㉿kali)-[~/…/htb/labs/cerberus/bloodhound]
└─$ bloodhound
Firing up neo4j and bloodhound
Ingested domain data uploaded
Kerberoast-able Accounts
adfs_svc$
is a kerberoast-able account
adfs_svc$
adfs_svc$
is a Group-Managed-Service-Account(gMSA
)
It’s also considered a computer object
Interestingly, its gMSA password can be read by the computer object of the
dc.cerberus.local
host