hacktricks/windows-hardening/active-directory-methodology/bloodhound.md

109 lines
7.4 KiB
Markdown
Raw Permalink Normal View History

2022-10-06 23:16:43 +00:00
# BloodHound & Other AD Enum Tools
2022-04-28 16:01:33 +00:00
<details>
2024-02-10 17:52:19 +00:00
<summary><strong>htARTE (HackTricks AWS Red Team Expert)</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>!HackTricks AWS Red Team Expert</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
2024-02-08 03:08:28 +00:00
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
2022-12-05 22:29:21 +00:00
* **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
</details>
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
## AD Explorer
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
[AD Explorer](https://docs.microsoft.com/en-us/sysinternals/downloads/adexplorer) is from Sysinternal Suite:
2022-04-28 16:01:33 +00:00
2022-10-17 08:47:51 +00:00
> An advanced Active Directory (AD) viewer and editor. You can use AD Explorer to navigate an AD database easily, define favourite locations, view object properties, and attributes without opening dialog boxes, edit permissions, view an object's schema, and execute sophisticated searches that you can save and re-execute.
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
### Snapshots
AD Explorer can create snapshots of an AD so you can check it offline.\
It can be used to discover vulns offline, or to compare different states of the AD DB across the time.
You will be requires the username, password, and direction to connect (any AD user is required).
To take a snapshot of AD, go to `File` --> `Create Snapshot` and enter a name for the snapshot.
## ADRecon
2024-02-08 03:08:28 +00:00
[**ADRecon**](https://github.com/adrecon/ADRecon) is a tool which extracts and combines various artefacts out of an AD environment. The information can be presented in a **specially formatted** Microsoft Excel **report** that includes summary views with metrics to facilitate analysis and provide a holistic picture of the current state of the target AD environment.
2022-10-06 23:16:43 +00:00
```bash
# Run it
.\ADRecon.ps1
```
## BloodHound
2024-02-08 03:08:28 +00:00
From [https://github.com/BloodHoundAD/BloodHound](https://github.com/BloodHoundAD/BloodHound)
2024-02-08 03:08:28 +00:00
> BloodHound is a single page Javascript web application, built on top of [Linkurious](http://linkurio.us/), compiled with [Electron](http://electron.atom.io/), with a [Neo4j](https://neo4j.com/) database fed by a C# data collector.
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.
So, [Bloodhound ](https://github.com/BloodHoundAD/BloodHound)is an amazing tool which can enumerate a domain automatically, save all the information, find possible privilege escalation paths and show all the information using graphs.
2022-02-24 21:08:46 +00:00
Booldhound is composed of 2 main parts: **ingestors** and the **visualisation application**.
The **ingestors** are used to **enumerate the domain and extract all the information** in a format that the visualisation application will understand.
The **visualisation application uses neo4j** to show how all the information is related and to show different ways to escalate privileges in the domain.
### Installation
After the creation of BloodHound CE, the entire project was updated for ease of use with Docker. The easiest way to get started is to use its pre-configured Docker Compose configuration.
1. Install Docker Compose. This should be included with the [Docker Desktop](https://www.docker.com/products/docker-desktop/) installation.
2. Run:
```
curl -L https://ghst.ly/getbhce | docker compose -f - up
```
2024-02-10 17:52:19 +00:00
3. Docker Compose-ghItlh vItlhutlhlaHchugh, terminal output Daq password randomly generated vItlhutlhlaHchugh.
2024-02-10 17:52:19 +00:00
4. browser, http://localhost:8080/ui/login Daq navigatelnIS. admin username 'ej randomly generated password logs Daq login.
vaj password randomly generated vItlhutlhlaHchugh 'ej vItlhutlhlaHchugh, 'ej vaj interface new ready, 'ej directly download ingestors vItlhutlhlaHchugh.
### SharpHound
They have several options but if you want to run SharpHound from a PC joined to the domain, using your current user and extract all the information you can do:
```
./SharpHound.exe --CollectionMethods All
Invoke-BloodHound -CollectionMethod All
```
2024-02-10 17:52:19 +00:00
> **CollectionMethod** 'e' vItlhutlh 'ej loop session [qaStaHvIS](https://support.bloodhoundenterprise.io/hc/en-us/articles/17481375424795-All-SharpHound-Community-Edition-Flags-Explained) Daq.
2024-02-10 17:52:19 +00:00
vaj SharpHound vItlhutlh credentials different execute 'ej CMD netonly session create 'ej SharpHound run vItlhutlh:
```
runas /netonly /user:domain\user "powershell.exe -exec bypass"
```
2024-02-10 17:52:19 +00:00
[**Qa'vIn ired.team. Bloodhound**](https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux)
2022-10-17 08:47:51 +00:00
2022-10-06 23:16:43 +00:00
## Group3r
2022-04-28 16:01:33 +00:00
2024-02-10 17:52:19 +00:00
[**Group3r**](https://github.com/Group3r/Group3r) vItlhutlh **vulnerabilities** Active Directory associated **Group Policy**. \
**run group3r** vItlhutlh **host** domain **user**.
2022-10-06 23:16:43 +00:00
```bash
2024-02-10 17:52:19 +00:00
group3r.exe -f <filepath-name.log>
2022-10-06 23:16:43 +00:00
# -s sends results to stdin
# -f send results to file
```
## PingCastle
2022-04-28 16:01:33 +00:00
2024-02-08 03:08:28 +00:00
[**PingCastle**](https://www.pingcastle.com/documentation/) **evaluates the security posture of an AD environment** and provides a nice **report** with graphs.
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
To run it, can execute the binary `PingCastle.exe` and it will start an **interactive session** presenting a menu of options. The default option to use is **`healthcheck`** which will establish a baseline **overview** of the **domain**, and find **misconfigurations** and **vulnerabilities**.&#x20;
<details>
2024-02-09 00:38:08 +00:00
<summary><strong>Learn AWS hacking from zero to hero with</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2022-10-06 23:16:43 +00:00
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
2024-02-08 03:08:28 +00:00
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
2022-12-05 22:29:21 +00:00
* **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
2022-04-28 16:01:33 +00:00
</details>