BloodHound


BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.

Ingestion


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya/bloodhound]
└─$ KRB5CCNAME=../andrea.hayes@nagoya.nagoya-industries.com.ccache bloodhound-python -d NAGOYA-INDUSTRIES.COM -u andrea.hayes -k -no-pass --auth-method kerberos -ns $IP -dc nagoya.nagoya-industries.com --zip -c Experimental,LoggedOn,All -op python_
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: nagoya-industries.com
INFO: Using TGT from cache
INFO: Found TGT with correct principal in ccache file.
INFO: Connecting to LDAP server: nagoya.nagoya-industries.com
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: nagoya.nagoya-industries.com
INFO: Found 36 users
INFO: Found 56 groups
INFO: Found 2 gpos
INFO: Found 4 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: nagoya.nagoya-industries.com
INFO: User with SID S-1-5-21-1969309164-1513403977-1686805993-1136 is logged in on nagoya.nagoya-industries.com
INFO: Done in 00M 08S
INFO: Compressing output into 20250423183454_bloodhound.zip

Using one of the TGTs, ingestion complete

Preps


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya/bloodhound]
└─$ neo4j_kickstart
2025-04-23 16:36:16.830+0000 INFO  Starting...
2025-04-23 16:36:17.289+0000 INFO  This instance is ServerId{823c0986} (823c0986-8860-45ad-af0e-a0f1316bef16)
2025-04-23 16:36:18.256+0000 INFO  ======== Neo4j 4.4.26 ========
2025-04-23 16:36:19.130+0000 INFO  Performing postInitialization step for component 'security-users' with version 3 and status CURRENT
2025-04-23 16:36:19.130+0000 INFO  Updating the initial password in component 'security-users'
2025-04-23 16:36:19.937+0000 INFO  Bolt enabled on localhost:7687.
2025-04-23 16:36:20.651+0000 INFO  Remote interface available at http://localhost:7474/
2025-04-23 16:36:20.658+0000 INFO  id: F22BE6505A50EE3B6AE80482B39DD2B6A7082E68C916A87DF6F1CD7ECA4DD942
2025-04-23 16:36:20.658+0000 INFO  name: system
2025-04-23 16:36:20.658+0000 INFO  creationDate: 2024-09-01T10:39:20.089Z
2025-04-23 16:36:20.658+0000 INFO  Started.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya/bloodhound]
└─$ bloodhound

Starting neo4j and bloodhound

Successfully uploaded the ingested domain data

Domain


Kerberoast-able


Both svc_helpdesk and svc_mssql are kerberoast-able

svc_mssql User


The svc_mssql account is likely a service account tied to a possible internal MSSQL instance SPN is configured to MSSQL/nagoya.nagoya-industries.com

andrea.hayes User


The andrea.hayes user being part of the employees group grants the GenericAll access to the following users;

  • bethan.webster
  • joanna.wood
  • iain.white
  • svc_helpdesk

fiona.clark User


Much like the andrea.hayes user above, the fiona.clark user being part of the employees group grants the GenericAll access to the following users;

  • bethan.webster
  • joanna.wood
  • iain.white
  • svc_helpdesk

craig.carr User


The craig.carr user is also part of the employees group, granting the GenericAll access to the following users;

  • bethan.webster
  • joanna.wood
  • iain.white
  • svc_helpdesk

employees Group


As enumerated above, the employees group has the GenericAll access to the following users;

  • bethan.webster
  • joanna.wood
  • iain.white
  • svc_helpdesk

bethan.webster User


The bethan.webster user is part of the helpdesk group

joanna.wood User


The joanna.wood user is also part of the helpdesk group

svc_helpdesk User


The svc_helpdesk account appears to be a service account as it has a SPN configured to it; http/nagoya.nagoya-industries.com Additionally, the account is also part of the helpdesk group

iain.white User


The iain.white user is also part of the helpdesk group

helpdesk Group


The helpdesk group has the GenericAll access to a lot of users

christopher.lewis User


In particular, the christopher.lewis user has a transitive membership to the Remote Management Users group, allowing direct access to the DC host via WinRM

Active Session


The svc_mssql account has an active session to the nagoya.nagoya-industries.com host