https://github.com/byt3n33dl3/bloodhound

Six Degrees of Enterprise Domain Admin

https://github.com/byt3n33dl3/bloodhound

Science Score: 26.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (11.4%) to scientific vocabulary

Keywords

activedirectory api-backend attack-mapper attack-paths bloodhound enterprise pentesting post-exploitation
Last synced: 5 months ago · JSON representation

Repository

Six Degrees of Enterprise Domain Admin

Basic Info
  • Host: GitHub
  • Owner: byt3n33dl3
  • License: gpl-3.0
  • Language: C#
  • Default Branch: main
  • Homepage:
  • Size: 259 MB
Statistics
  • Stars: 28
  • Watchers: 1
  • Forks: 2
  • Open Issues: 2
  • Releases: 8
Topics
activedirectory api-backend attack-mapper attack-paths bloodhound enterprise pentesting post-exploitation
Created over 1 year ago · Last pushed 9 months ago
Metadata Files
Readme Contributing Funding License Code of conduct Codeowners Security

README.md

BloodHound Community Edition

BloodHound Enterprise

Six Degrees of Enterprise Domain Admin

About Exec Deploy Main

BloodHound

BloodHound is a monolithic web application composed of an embedded React frontend with Sigma.js and a C# with Go based REST API backend. It is deployed with a PostgreSQL application database and a Neo4J graph database, and is fed by the SharpHound, or SharpHoundAD, and AzureHoundAD or AzureHound data collectors, and last one Called Barracuda from BlackMarlinExec.

New Collectors: After BloodHound Enterprise Vol 6.3.5 Editions release, BloodHound now can retrieve data from BlackMarlinExec Module: Barracuda execution, Enjoy!.

How does it Exec ?

It Uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to quickly identify highly complex attack paths that would otherwise be impossible to find.

BloodHound is created and maintained by the BloodHound Enterprise Team. The original BloodHound was created by @wald0, @rvazarkar, @byt3n33dl3, and @harmj0y.

Running BloodHound Enterprise Edition

Docker Compose is the easiest way to get up and running with BloodHound. Instructions below describe how to install and upgrade your deployment.

Extra Overview

[!NOTE] Easy, Reliable, Effective Map, Prioritize, and Remediate Identity Attack Paths Management.

[!NOTE] See your Organization from the Attackers view, an Attack Path Management solution quantifies identity Attack Paths in Active Directory and Azure Environments.

Deploy BloodHound

Deploying BloodHound quickly with the following steps:

Docker Desktop includes Docker Compose as part of the installation.

  • Download the Docker Compose YAML file

Save it to a directory where you'd like to run BloodHound. You can do this from a terminal application with

curl -L https://s.id/getbhe

Or you can manually go to this Directory at Docker compose

sh https://raw.githubusercontent.com/byt3n33dl3/BloodHound/main/examples/docker-compose/docker-compose.yml

[!WARNING] NOTE: If the option is unavailable, please go EXECUTE this one curl -L https://ghst.ly/getbhce

Minimum specifications:

  • 4GB to 6GB of RAM
  • 4 processor cores
  • 10GB hard Disk space
  • On Windows: Execute the command

in CMD, or use curl.exe instead of curl in PowerShell.

  • Navigate to the folder

with the saved docker-compose.yml file and run docker compose pull && docker compose up.

  • Locate

The randomly generated password in the terminal output of Docker Compose.

  • In a Browser

Navigate to http://localhost:8080/ui/login. Login with a username of admin and the randomly generated password from the logs.

NOTE: The default docker-compose.yml example binds only to localhost (127.0.0.1). If you want to access BloodHound outside of localhost, you'll need to follow the instructions in README.md to configure the host binding for the container.

Installation Error Handling

  • If you encounter a "failed to get console mode for stdin: The handle is invalid." ensure Docker Desktop (and associated Engine is running). Docker Desktop does not automatically register as a startup entry.

  • If you encounter an "Error response from daemon: Ports are not available: exposing port TCP 127.0.0.1:7474 -> 0.0.0.0:0: listen tcp 127.0.0.1:7474: bind: Only one usage of each socket address (protocol/network address/port) is normally permitted." this is normally attributed to the "Neo4J Graph Database - Neo4j" service already running on your local system. Please stop or delete the service to continue.

```

Verify if Docker Engine is Running

docker info

Attempt to stop Neo4j Service if running (on Windows)

Stop-Service "Neo4j" -ErrorAction SilentlyContinue ```

Indestructible

The Enterprise for Yacht

Management Upgrade Kit

Enterprise

BloodHound Enterprise is an Attack Path Management solution that continuously maps and quantifies Active Directory Attack Paths. You can remove millions, even billions of Attack Paths within your existing architecture and eliminate the Attackers easiest, most reliable, and most Attractive techniques.

Running the Neo4j database:

The installation manual will have taken you through an installation of Neo4j, the Database hosting the BloodHound datasets.

sudo neo4j start

Upgrade BloodHound

Once installed, upgrade BloodHound to the latest version with the following steps:

  • Navigate to the folder

with the saved docker compose.yml file and run docker compose pull && docker compose up.

  • In a browser

navigate to http://localhost:8080 and log in with your previously configured username and password.

Importing sample data

The BloodHound team has provided some sample data for testing BloodHound without performing a SharpHound or AzureHound collection. That data may be found here.

License from @SpecterOps

  • Apache License 2.0

Licenses from @GangstaCrew

  • BSD-2-Clause License & AGPL 3.0

Unless otherwise annotated by a lower-level LICENSE file or license header, all files in this repository are released under the Apache-2.0 license. A full copy of the license may be found in the top level LICENSE file.

Useful Links

Credits / main

BloodHound Contributors

Virtual hug to everyone who contributed

Owner

  • Name: Sulaiman
  • Login: byt3n33dl3
  • Kind: user
  • Location: Error 403: Not on earth

I N F R A X 8 6

GitHub Events

Total
  • Create event: 6
  • Issues event: 1
  • Release event: 6
  • Watch event: 9
  • Delete event: 2
  • Issue comment event: 1
  • Push event: 64
  • Gollum event: 5
Last Year
  • Create event: 6
  • Issues event: 1
  • Release event: 6
  • Watch event: 9
  • Delete event: 2
  • Issue comment event: 1
  • Push event: 64
  • Gollum event: 5

Issues and Pull Requests

Last synced: 10 months ago

All Time
  • Total issues: 2
  • Total pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Total issue authors: 2
  • Total pull request authors: 0
  • Average comments per issue: 0.5
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 2
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 2
  • Pull request authors: 0
  • Average comments per issue: 0.5
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
  • byt3n33dl3 (1)
  • marco-in-tech (1)
Pull Request Authors
Top Labels
Issue Labels
bug (2) documentation (1) help wanted (1)
Pull Request Labels