BloodHound
BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.
Ingestion
┌──(kali㉿kali)-[~/…/htb/labs/cicada/bloodhound]
└─$ KRB5CCNAME=../michael.wrightson@cicada-dc.cicada.htb.ccache bloodhound-python -d CICADA.HTB -u michael.wrightson -k -no-pass --auth-method kerberos -ns $IP -dc cicada-dc.cicada.htb --zip -c ALL
Password:
INFO: Found AD domain: cicada.htb
INFO: Using TGT from cache
INFO: Found TGT with correct principal in ccache file.
INFO: Connecting to LDAP server: cicada-dc.cicada.htb
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: cicada-dc.cicada.htb
INFO: Found 9 users
INFO: Found 54 groups
INFO: Found 3 gpos
INFO: Found 2 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: CICADA-DC.cicada.htb
INFO: Done in 00M 04S
INFO: Compressing output into 20240929054421_bloodhound.zip
Using the TGT of the michael.wrightson
account, the entire domain data can be ingested through bloodhound-python
Preps
┌──(kali㉿kali)-[~/…/htb/labs/cicada/bloodhound]
└─$ neo4j_kickstart
2024-09-29 03:45:50.726+0000 INFO Starting...
2024-09-29 03:45:51.167+0000 INFO This instance is ServerId{823c0986} (823c0986-8860-45ad-af0e-a0f1316bef16)
2024-09-29 03:45:52.176+0000 INFO ======== Neo4j 4.4.37 ========
2024-09-29 03:45:52.993+0000 INFO Performing postInitialization step for component 'security-users' with version 3 and status CURRENT
2024-09-29 03:45:52.993+0000 INFO Updating the initial password in component 'security-users'
2024-09-29 03:45:53.737+0000 INFO Bolt enabled on localhost:7687.
2024-09-29 03:45:54.472+0000 INFO Remote interface available at http://localhost:7474/
2024-09-29 03:45:54.475+0000 INFO id: F22BE6505A50EE3B6AE80482B39DD2B6A7082E68C916A87DF6F1CD7ECA4DD942
2024-09-29 03:45:54.476+0000 INFO name: system
2024-09-29 03:45:54.476+0000 INFO creationDate: 2024-09-01T10:39:20.089Z
2024-09-29 03:45:54.476+0000 INFO Started.
┌──(kali㉿kali)-[~/…/htb/labs/cicada/bloodhound]
└─$ bloodhound
Firing up neo4j and bloodhound
Uploading the ingested domain data
Domain
michael.wrightson
david.orelious
There is the password disclosure in the
description
field. This was initially found from LDAPDomainDump
emily.oscars
The user is part of both
Remote Management Users
and Backup Operators
groups