BloodHound with Kali Linux: 101
This lab is to see what it takes to install BloodHound on Kali Linux as well as a brief exploration of the UI, understanding what it shows and how it can help a pentester/redteamer to escalate privileges in order to reach their objectives.
It is surprising easy to install bloodhound these days from Kali Linux:
Part of the installation process, neo4j database management solution that is required for BloodHound will also be installed that will need to be configured.
Once the installation is complete, we need to configure neo4j - mainly just change default passwords, so let's run:
and navigate to http://localhost:7474/ to set up a DB user account by changing default passwords from neo4j:neo4j to something else - we will need those credentials when launching BloodHound itself.
Login with your previously set credentials from neo4j:
BloodHound is a data visualisation tool, meaning without any data is not at all useful. BloodHound is very good at visualising Active Directory object relationships and various permissions between those relationships.
In order for BloodHound to do its magic, we need to enumerate a victim domain. The enumeration process produces a JSON file that describes various relationships and permissions between AD objects as mentioned earlier, which can then be imported to BloodHound. Once the resulting JSON file is ingested/imported to BloodHound, it will allow us to visually see the ways (if any) how Active Directory and its various objects can be (ab)used to elevate privileges, ideally to Domain Admin.
I tried running the SharpHound (the BloodHound ingestor, just a confusing name) from an account that was not a domain member, so I got the following message:
If you are on a machine that is a member, but you are authenticated as a local user, but have credentials for a domain user, get a shell for that user like so:
runas /user:[email protected] powershell
// if machine is not a domain member
runas /netonly /user:[email protected] powershell
We can now proceed to AD enumeration:
Invoke-BloodHound -CollectionMethod All -JSONFolder "c:\experiments\bloodhound"
The above command will produce the previously mentioned JSON file, albeit zipped:
We can now take the .zip file that was generated by Invoke-BloodHound and just drag and drop it to the BloodHound interface for ingestion. Once the ingestion is complete, we can play around with Pre-canned queries that actually visualise the provided data:
Once the data is ingested, as mentioned, we can play around with the built in queries to find things like
All Domain Admins,
Shortest Path to Domain Adminsand similar, that may help us as an attacker to escalate privileges and compromise the entire domains/forest.
A contrived and maybe not entirely realistic, but still - the below shows how an attacker could assume privileges of
Exchange Trusted Subsystemgroup when on the victim network as user spotless:
The above indicates that
offense\spotlessis admin to the
DC01$(could use mimikatz to pass the machine account hash to get an elevated shell) where
offense\administratorsession is observed (dump lsass or token impersonation for administrator) and this way assume rights of the Exchange Trusted Subsystem group!
What exactly is the Exchange Trusted Subsystem?
net group "Exchange Trusted Subsystem"
Group name Exchange Trusted Subsystem
Comment This group contains Exchange servers that run Exchange cmdlets on behalf of users via the management serv
ice. Its members have permission to read and modify all Exchange configuration, as well as user accounts and groups. Thi
s group should not be deleted.
The below shows how the user spotless could assume privileges of a Domain Admin.
Similarly to the previous example, spotless is admin of the DC01$ where admin session is established. If that session is compromised (it is), it makes the user spotless a Domain Admin:
The below shows how the user spotless can become a Domain Admin by abusing weak ACEs of the said group. In this particular example, the user spotless can essentially add themselves to domain admins group with
net group "domain admins" spotless /add /domainand it is gamer over:
See my previous lab that explores some of the ways of manually exploiting and abusing Active Directory ACL/ACE misconfiguration of privileges such as