8. Perform Remote AD Recon with BloodHound
Now that weβve dumped the domain structure, the next step is visualizing it using BloodHound to hunt for privilege escalation paths π΅οΈββοΈ.
What is BloodHound ?
π΅οΈββοΈ BloodHound is a powerful Active Directory (AD) enumeration and attack path analysis tool used during post-exploitation.
π What does BloodHound do?
BloodHound maps relationships and permissions between:
Users
Groups
Computers
Domains
It shows how a low-privileged user (like alfredo) could escalate privileges, using misconfigurations or weak permissions.
π§ BloodHound Collection Command:
bloodhound-python -u 'alfredo' -p 'Password1' -ns 192.168.10.4 -d megachange.nyx -c All --zipOptions explained:
-u: Username (just the name, not domain)-p: Password foralfredo-ns: IP of the domain controller (nameserver)-d: Domain name (e.g.,megachange.nyx)-c All: Collect all information (sessions, trusts, ACLs, etc.)--zip: Output a.zipfile for use in BloodHound GUI


π After That:
Open the BloodHound GUI (on Kali:
bloodhound).Upload the
.zipfile.
Use pre-built queries like:
"Find Principals with DCSync Rights"
"Shortest Paths to Domain Admins"
"Users with Admin Rights on Computers"
π― What to Look For:
Paths from
alfredoto:Domain Admins
Machines with Admin access
Users with weak permissions (e.g.,
GenericWrite,ForceChangePassword,AddMember)
Last updated