Bloodhoud Azurehound Sharphound
About
BloodHound is a monolithic web application composed of an embedded React frontend with Sigma.js and a Go based REST API backend. It is deployed with a Postgresql application database and a Neo4j graph database, and is fed by the SharpHound and AzureHound data collectors.
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to quickly identify highly complex attack paths that would otherwise be impossible to find. Defenders can use BloodHound to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to better understand privileged relationships in an Active Directory or Azure environment.
Links
Sharphound Github - For AD Ingestion
Azurehound Github - For EntraID and Azure Ingestion
Bloodhound.py Github - For AD Ingestion
Installing
Kali
Purge older versions of neo4j and bloodhound
sudo apt purge -t neo4j bloodhoundReinstall neo4j and bloodhound
First time running is
If you get this error:
Rerun:
This should open a wepbage to http://localhost:7474/browser for you to log in with neo4js default credentials: neo4j:neo4j. This info will also be shown when running the setup. You will need to: Change the neo4j default password, and edit the /etc/bhapi/bhapi.json file with the updated password.
Now we can run bloodhound
This will open a webpage to http://127.0.0.1:8080
The default username and password is admin. Afterlogging in, it will want a new password.
Usage
Ingesting
Ingest files from SharpHound, AzureHound, or Bloodhound-python. They also have sample data you can use, for Active Directory (AD) or Azure
Bloodhound-Python
Then by going to http://127.0.0.1:8080/ui/administration/file-ingest - or Highlighting the Icon that looks like a User and a cog wheel on the left, and selecting File Ingest, then selecting upload file(s).
After uploading has completed, you will see it here. It may take a few minutes to ingest and look at all the data depending how much data you have. Wait until the status says complete.
Analyzing the data
On the left hand side, click the line graph icon and select explore, or go to http://127.0.0.1:8080/u/explore. From here is where we can look into any information needed.
For good base information, under </> CYPHER we can click the folder icon to see all their queries pre-loaded.
For example, All Domain Admins.
Queries
Tier Zero users with email
AS-REP Roastable Tier Zero users (DontReqPreAuth)
Tier Zero computers not owned by Tier Zero
Tier Zero accounts that can be delegated
Tier Zero AD principals synchronized with Entra ID
Kerberoastable members of Tier Zero / High Value groups
Enabled Tier Zero / High Value principals inactive for 60 days
Enabled users inactive for 180 days
Stopping
Linux
Top stop the bloodhound service, run:
Last updated