BloodHound
BloodHound is a powerful tool used by adversaries to visualize and analyze Active Directory relationships, allowing them to quickly identify and exploit potential attack paths and privilege escalation opportunities within a network. It automates the reconnaissance phase of an attack, helping attackers pinpoint weak points and ultimately compromise Active Directory environments.
Ingestion
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/resourced/bloodhound]
└─$ KRB5CCNAME=../v.ventz@ResourceDC.resourced.local.ccache bloodhound-python -d RESOURCED.LOCAL -u v.ventz -k -no-pass --auth-method kerberos -ns $IP -dc ResourceDC.resourced.local --zip -c Experimental,LoggedOn,All -op python_
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: resourced.local
INFO: Using TGT from cache
INFO: Found TGT with correct principal in ccache file.
INFO: Connecting to LDAP server: ResourceDC.resourced.local
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: ResourceDC.resourced.local
INFO: Found 14 users
INFO: Found 52 groups
INFO: Found 2 gpos
INFO: Found 1 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: ResourceDC.resourced.local
INFO: Done in 00M 07S
INFO: Compressing output into 20250422203358_bloodhound.zip
Using the TGT of the v.ventz
user, Ingestion complete
Preps
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/resourced/bloodhound]
└─$ neo4j_kickstart
2025-04-22 18:34:26.726+0000 INFO Starting...
2025-04-22 18:34:27.039+0000 INFO This instance is ServerId{823c0986} (823c0986-8860-45ad-af0e-a0f1316bef16)
2025-04-22 18:34:28.010+0000 INFO ======== Neo4j 4.4.26 ========
2025-04-22 18:34:28.956+0000 INFO Performing postInitialization step for component 'security-users' with version 3 and status CURRENT
2025-04-22 18:34:28.956+0000 INFO Updating the initial password in component 'security-users'
2025-04-22 18:34:30.515+0000 INFO Bolt enabled on localhost:7687.
2025-04-22 18:34:31.298+0000 INFO Remote interface available at http://localhost:7474/
2025-04-22 18:34:31.301+0000 INFO id: F22BE6505A50EE3B6AE80482B39DD2B6A7082E68C916A87DF6F1CD7ECA4DD942
2025-04-22 18:34:31.301+0000 INFO name: system
2025-04-22 18:34:31.301+0000 INFO creationDate: 2024-09-01T10:39:20.089Z
2025-04-22 18:34:31.301+0000 INFO Started.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/resourced/bloodhound]
└─$ bloodhound
Starting neo4j & bloodhound
Uploaded
Domain
v.ventz
User
N/A
l.livingstone
User
As enumerated previously, the
l.livingstone
user is able to WinRM and RDP to the target system
Additionally, the user has the GenericAll privilege over the ResouceDC.resourced.local
host