Bloodhoud Azurehound Sharphound

About

BloodHound is a monolithic web application composed of an embedded React frontend with Sigma.js and a Go based REST API backend. It is deployed with a Postgresql application database and a Neo4j graph database, and is fed by the SharpHound and AzureHound data collectors.

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to quickly identify highly complex attack paths that would otherwise be impossible to find. Defenders can use BloodHound to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to better understand privileged relationships in an Active Directory or Azure environment.

Bloodhoubd Github

Bloodhound-CE Quickstart

Sharphound Github - For AD Ingestion

Azurehound Github - For EntraID and Azure Ingestion

Bloodhound.py Github - For AD Ingestion

Cypher Queries

Installing

Kali

Purge older versions of neo4j and bloodhound

sudo apt purge -t neo4j bloodhound

Reinstall neo4j and bloodhound

First time running is

If you get this error:

Rerun:

This should open a wepbage to http://localhost:7474/browser for you to log in with neo4js default credentials: neo4j:neo4j. This info will also be shown when running the setup. You will need to: Change the neo4j default password, and edit the /etc/bhapi/bhapi.json file with the updated password.

Now we can run bloodhound

This will open a webpage to http://127.0.0.1:8080

The default username and password is admin. Afterlogging in, it will want a new password.

Usage

Ingesting

Ingest files from SharpHound, AzureHound, or Bloodhound-python. They also have sample data you can use, for Active Directory (AD) or Azure

Bloodhound-Python

Then by going to http://127.0.0.1:8080/ui/administration/file-ingest - or Highlighting the Icon that looks like a User and a cog wheel on the left, and selecting File Ingest, then selecting upload file(s).

After uploading has completed, you will see it here. It may take a few minutes to ingest and look at all the data depending how much data you have. Wait until the status says complete.

Analyzing the data

On the left hand side, click the line graph icon and select explore, or go to http://127.0.0.1:8080/u/explore. From here is where we can look into any information needed.

For good base information, under </> CYPHER we can click the folder icon to see all their queries pre-loaded.

For example, All Domain Admins.

Queries

Tier Zero users with email

AS-REP Roastable Tier Zero users (DontReqPreAuth)

Tier Zero computers not owned by Tier Zero

Tier Zero accounts that can be delegated

Tier Zero AD principals synchronized with Entra ID

Kerberoastable members of Tier Zero / High Value groups

Enabled Tier Zero / High Value principals inactive for 60 days

Enabled users inactive for 180 days

Stopping

Linux

Top stop the bloodhound service, run:

Last updated