BloodHound
BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.
Ingestion
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya/bloodhound]
└─$ KRB5CCNAME=../andrea.hayes@nagoya.nagoya-industries.com.ccache bloodhound-python -d NAGOYA-INDUSTRIES.COM -u andrea.hayes -k -no-pass --auth-method kerberos -ns $IP -dc nagoya.nagoya-industries.com --zip -c Experimental,LoggedOn,All -op python_
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: nagoya-industries.com
INFO: Using TGT from cache
INFO: Found TGT with correct principal in ccache file.
INFO: Connecting to LDAP server: nagoya.nagoya-industries.com
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: nagoya.nagoya-industries.com
INFO: Found 36 users
INFO: Found 56 groups
INFO: Found 2 gpos
INFO: Found 4 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: nagoya.nagoya-industries.com
INFO: User with SID S-1-5-21-1969309164-1513403977-1686805993-1136 is logged in on nagoya.nagoya-industries.com
INFO: Done in 00M 08S
INFO: Compressing output into 20250423183454_bloodhound.zip
Using one of the TGTs, ingestion complete
Preps
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya/bloodhound]
└─$ neo4j_kickstart
2025-04-23 16:36:16.830+0000 INFO Starting...
2025-04-23 16:36:17.289+0000 INFO This instance is ServerId{823c0986} (823c0986-8860-45ad-af0e-a0f1316bef16)
2025-04-23 16:36:18.256+0000 INFO ======== Neo4j 4.4.26 ========
2025-04-23 16:36:19.130+0000 INFO Performing postInitialization step for component 'security-users' with version 3 and status CURRENT
2025-04-23 16:36:19.130+0000 INFO Updating the initial password in component 'security-users'
2025-04-23 16:36:19.937+0000 INFO Bolt enabled on localhost:7687.
2025-04-23 16:36:20.651+0000 INFO Remote interface available at http://localhost:7474/
2025-04-23 16:36:20.658+0000 INFO id: F22BE6505A50EE3B6AE80482B39DD2B6A7082E68C916A87DF6F1CD7ECA4DD942
2025-04-23 16:36:20.658+0000 INFO name: system
2025-04-23 16:36:20.658+0000 INFO creationDate: 2024-09-01T10:39:20.089Z
2025-04-23 16:36:20.658+0000 INFO Started.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya/bloodhound]
└─$ bloodhound
Starting neo4j and bloodhound
Successfully uploaded the ingested domain data
Domain
Kerberoast-able
Both
svc_helpdesk
and svc_mssql
are kerberoast-able
svc_mssql
User
The
svc_mssql
account is likely a service account tied to a possible internal MSSQL instance
SPN is configured to MSSQL/nagoya.nagoya-industries.com
andrea.hayes
User
The
andrea.hayes
user being part of the employees
group grants the GenericAll access to the following users;
bethan.webster
joanna.wood
iain.white
svc_helpdesk
fiona.clark
User
Much like the
andrea.hayes
user above, the fiona.clark
user being part of the employees
group grants the GenericAll access to the following users;
bethan.webster
joanna.wood
iain.white
svc_helpdesk
craig.carr
User
The
craig.carr
user is also part of the employees
group, granting the GenericAll access to the following users;
bethan.webster
joanna.wood
iain.white
svc_helpdesk
employees
Group
As enumerated above, the
employees
group has the GenericAll access to the following users;
bethan.webster
joanna.wood
iain.white
svc_helpdesk
bethan.webster
User
The
bethan.webster
user is part of the helpdesk
group
joanna.wood
User
The
joanna.wood
user is also part of the helpdesk
group
svc_helpdesk
User
The
svc_helpdesk
account appears to be a service account as it has a SPN configured to it; http/nagoya.nagoya-industries.com
Additionally, the account is also part of the helpdesk
group
iain.white
User
The
iain.white
user is also part of the helpdesk
group
helpdesk
Group
The
helpdesk
group has the GenericAll access to a lot of users
christopher.lewis
User
In particular, the
christopher.lewis
user has a transitive membership to the Remote Management Users
group, allowing direct access to the DC host via WinRM
Active Session
The
svc_mssql
account has an active session to the nagoya.nagoya-industries.com
host