Parse output from common sources and transform it into BloodHound-ingestible data
Project description
_____________________________ __ __ ______ __ __ __ __ _______
| _ / / __ / | ____/| | | | / __ \ | | | | | \ | | | \
| |_) | | | | | | |__ | |__| | | | | | | | | | | \| | | .--. |
| _ < | | | | | __| | __ | | | | | | | | | | . ` | | | | |
| |_) | | `--' | | | | | | | | `--' | | `--' | | |\ | | '--' |
|______/ \______/ |__| |__| |___\_\________\_\________\|__| \___\|_________\
by Fortalice ✪
BOFHound
BOFHound is an offline BloodHound ingestor and LDAP result parser compatible with TrustedSec's ldapsearch BOF and the Python adaptation, pyldapsearch.
By parsing log files generated by the aforementioned tools, BOFHound allows operators to utilize BloodHound's beloved interface while maintaining full control over the LDAP queries being run and the spped at which they are executed. This leaves room for operator discretion to account for potential honeypot accounts, expensive LDAP query thresholds and other detection mechanisms designed with the traditional, automated BloodHound collectors in mind.
Blog - Granularize Your AD Recon Game
Installation
BOFHound can be installed with pip3 install bofhound
or by cloning this repository and running pip3 install .
.
Usage
Usage: bofhound [OPTIONS]
Generate BloodHound compatible JSON from logs written by ldapsearch BOF and
pyldapsearch
Options:
-i, --input TEXT Directory or file containing logs of ldapsearch
results [default: /opt/cobaltstrike/logs]
-o, --output TEXT Location to export bloodhound files [default: .]
-a, --all-properties Write all properties to BloodHound files (instead of
only common properties)
--debug Enable debug output
-z, --zip Compress the JSON output files into a zip archive
--help Show this message and exit.
Example Usage
Parse ldapseach BOF results from Cobalt Strike logs (/opt/cobaltstrike/logs
by default) to /data/
bofhound -o /data/
Parse pyldapsearch logs and only include common BloodHound properties
bofhound -i ~/.pyldapsearch/logs/ --all-properties
ldapsearch Query Examples
Required Data
The followign attributes are required for proper functionality:
samaccounttype
dn
objectsid
Get All the Data (Maybe Run BloodHound Instead?)
ldapsearch (objectclass=*)
Retrieve All Schema Info
ldapsearch (schemaIDGUID=*) name,schemaidguid -1 "" CN=Schema,CN=Configuration,DC=windomain,DC=local
Retrieve Only the ms-Mcs-AdmPwd schemaIDGUID
ldapsearch (name=ms-mcs-admpwd) name,schemaidguid 1 "" CN=Schema,CN=Configuration,DC=windomain,DC=local
Development
bofhound uses Poetry to manage dependencies. Install from source and setup for development with:
git clone https://github.com/fortalice/bofhound
cd bofhound
poetry install
poetry run bofhound --help
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.