CG
SkillsConducting Internal Reconnaissance with BloodHound Ce
Start Free
Back to Skills Library
Red Team & Offensive Security๐ŸŸก Intermediate

Conducting Internal Reconnaissance with BloodHound Ce

Conduct internal Active Directory reconnaissance using BloodHound Community Edition to map attack paths, identify privilege escalation chains, and discover misconfigurations in domain environments.

4 min read5 code examples5 MITRE techniques

MITRE ATT&CK Coverage

T1087.002T1069.002T1482T1615T1018

Conducting Internal Reconnaissance with BloodHound CE

Overview

BloodHound Community Edition (CE) is a modern, web-based Active Directory reconnaissance platform developed by SpecterOps that uses graph theory to reveal hidden relationships and attack paths within AD environments. Unlike the legacy BloodHound application, BloodHound CE uses a PostgreSQL backend with a dedicated graph database, providing improved performance, a modern web UI, and enhanced API capabilities. Red teams use BloodHound CE to collect AD objects, ACLs, sessions, group memberships, and trust relationships, then visualize attack paths from compromised low-privileged accounts to high-value targets like Domain Admins. The SharpHound collector (v2 for CE) gathers data from Active Directory, while AzureHound collects from Azure AD / Entra ID environments.

Objectives

  • Deploy BloodHound CE server using Docker Compose
  • Collect AD data using SharpHound v2 or BloodHound.py
  • Import collected data into BloodHound CE for graph analysis
  • Identify shortest attack paths from owned principals to Domain Admins
  • Discover ACL-based attack paths, Kerberoastable accounts, and delegation abuse
  • Execute custom Cypher queries for advanced attack path analysis
  • Generate attack path reports for engagement documentation

MITRE ATT&CK Mapping

  • T1087.002 - Account Discovery: Domain Account
  • T1069.002 - Permission Groups Discovery: Domain Groups
  • T1482 - Domain Trust Discovery
  • T1615 - Group Policy Discovery
  • T1018 - Remote System Discovery
  • T1033 - System Owner/User Discovery
  • T1016 - System Network Configuration Discovery

Implementation Steps

Phase 1: BloodHound CE Deployment

  1. Deploy BloodHound CE using Docker Compose:

```bash

curl -L https://ghst.ly/getbhce -o docker-compose.yml

docker compose pull

docker compose up -d

```

  1. Access the web interface at https://localhost:8080
  2. Log in with the default admin credentials (displayed in Docker logs):

```bash

docker compose logs | grep "Initial Password"

```

  1. Change the default admin password immediately

Phase 2: Data Collection with SharpHound v2

  1. Transfer SharpHound v2 to the compromised Windows host:

```powershell

# Execute full collection

.\SharpHound.exe -c All --outputdirectory C:\Temp

# DCOnly collection (LDAP only, stealthier)

.\SharpHound.exe -c DCOnly

# Session collection for logged-on user mapping

.\SharpHound.exe -c Session --loop --loopduration 02:00:00

# Collect from specific domain

.\SharpHound.exe -c All -d child.domain.local

```

  1. Alternative: Use BloodHound.py from Linux:

```bash

bloodhound-python -u user -p 'Password123' -d domain.local -ns 10.10.10.1 -c All

```

  1. Exfiltrate the generated ZIP file to the analysis workstation

Phase 3: Data Import and Initial Analysis

  1. Upload collected data via the BloodHound CE web interface (File Ingest)
  2. Mark compromised accounts as "Owned" in the interface
  3. Run built-in analysis queries:
  • Shortest Path to Domain Admin
  • Kerberoastable Users with Path to DA
  • AS-REP Roastable Users
  • Users with DCSync Rights
  • Computers with Unconstrained Delegation

Phase 4: Custom Cypher Queries

  1. Execute custom Cypher queries in the BloodHound CE search bar:

```cypher

// Find shortest path from owned principals to Domain Admins

MATCH p=shortestPath((n {owned:true})-[*1..]->(m:Group {name:"DOMAIN ADMINS@DOMAIN.LOCAL"}))

RETURN p

// Find Kerberoastable users with path to DA

MATCH (u:User {hasspn:true})

MATCH p=shortestPath((u)-[*1..]->(g:Group {name:"DOMAIN ADMINS@DOMAIN.LOCAL"}))

RETURN p

// Find computers with sessions of DA members

MATCH (c:Computer)-[:HasSession]->(u:User)-[:MemberOf*1..]->(g:Group {name:"DOMAIN ADMINS@DOMAIN.LOCAL"})

RETURN c.name, u.name

// Find ACL-based attack paths (GenericAll, WriteDACL, GenericWrite)

MATCH p=(u:User)-[:GenericAll|GenericWrite|WriteDacl|WriteOwner|ForceChangePassword*1..]->(t)

WHERE u.owned = true

RETURN p

// Find users who can DCSync

MATCH (u)-[:MemberOf0..]->()-[:DCSync|GetChanges|GetChangesAll1..]->(d:Domain)

RETURN u.name, d.name

// Find computers with LAPS but readable by non-admins

MATCH (c:Computer {haslaps:true})

MATCH p=(u:User)-[:ReadLAPSPassword]->(c)

RETURN p

```

Phase 5: Attack Path Prioritization

  1. Score identified attack paths by:
  • Number of hops (shorter = higher priority)
  • Stealth requirements (avoid noisy techniques)
  • Tool availability for each hop
  • Likelihood of detection at each step
  1. Create an execution plan for the highest-priority paths
  2. Identify required tools for each step in the chain
  3. Plan OPSEC considerations for each technique

Tools and Resources

ToolPurposePlatform
BloodHound CEWeb-based graph analysis platformDocker
SharpHound v2AD data collection (.NET, for CE)Windows
BloodHound.pyAD data collection (Python)Linux
AzureHoundAzure AD / Entra ID data collectionCross-platform
PlumHoundAutomated BloodHound reportingPython
BloodHound Query LibraryCommunity Cypher query repositoryWeb

Key Attack Path Types

Path TypeDescriptionExample
ACL AbuseExploit misconfigured ACLsGenericAll on DA group
KerberoastingCrack service account passwordsSPN account โ†’ DA
AS-REP RoastingAttack accounts without pre-authNo-preauth user โ†’ password crack
Delegation AbuseExploit unconstrained/constrained delegationComputer โ†’ impersonate DA
GPO AbuseModify GPOs applied to privileged OUsGPO write โ†’ code execution on DA
Session HijackLeverage DA sessions on compromised hostsAdmin session โ†’ token theft

Validation Criteria

  • [ ] BloodHound CE deployed and accessible
  • [ ] SharpHound v2 data collected from all domains in scope
  • [ ] Data successfully imported into BloodHound CE
  • [ ] Owned principals marked in the interface
  • [ ] Shortest paths to Domain Admin identified
  • [ ] ACL-based attack paths documented
  • [ ] Kerberoastable and AS-REP roastable accounts listed
  • [ ] Custom Cypher queries executed for advanced analysis
  • [ ] Attack paths prioritized by feasibility and stealth
  • [ ] Report generated with all identified paths and evidence

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC4.1 (Monitoring & Evaluation), CC7.1 (Monitoring)
  • ISO 27001: A.14.2 (Secure Development), A.18.2 (Information Security Reviews)
  • NIST 800-53: CA-8 (Penetration Testing), RA-5 (Vulnerability Scanning)
  • NIST CSF: ID.RA (Risk Assessment), PR.IP (Information Protection)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add conducting-internal-reconnaissance-with-bloodhound-ce

# Or load dynamically via MCP
grc.load_skill("conducting-internal-reconnaissance-with-bloodhound-ce")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact โ€” successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add conducting-internal-reconnaissance-with-bloodhound-ce
// Or via MCP
grc.load_skill("conducting-internal-reconnaissance-with-bloodhound-ce")

Tags

red-teamreconnaissancebloodhoundactive-directoryattack-pathsprivilege-escalationgraph-analysis

Related Skills

Red Team & Offensive Security

Performing Active Directory BloodHound Analysis

4mยทintermediate
Red Team & Offensive Security

Exploiting Active Directory Certificate Services Esc1

4mยทadvanced
Red Team & Offensive Security

Exploiting Active Directory with BloodHound

3mยทadvanced
Red Team & Offensive Security

Exploiting Constrained Delegation Abuse

4mยทadvanced
Red Team & Offensive Security

Exploiting Nopac CVE 2021 42278 42287

4mยทadvanced
Red Team & Offensive Security

Conducting Domain Persistence with Dcsync

4mยทintermediate

Skill Details

Domain
Red Team & Offensive Security
Difficulty
intermediate
Read Time
4 min
Code Examples
5
MITRE IDs
5

On This Page

OverviewObjectivesMITRE ATT&CK MappingImplementation StepsTools and ResourcesKey Attack Path TypesValidation CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free โ†’