Parse output from common sources and transform it into BloodHound-ingestible data
Project description
_____________________________ __ __ ______ __ __ __ __ _______
| _ / / __ / | ____/| | | | / __ \ | | | | | \ | | | \
| |_) | | | | | | |__ | |__| | | | | | | | | | | \| | | .--. |
| _ < | | | | | __| | __ | | | | | | | | | | . ` | | | | |
| |_) | | `--' | | | | | | | | `--' | | `--' | | |\ | | '--' |
|______/ \______/ |__| |__| |___\_\________\_\________\|__| \___\|_________\
<< @coffeegist | @Tw1sm >>
BOFHound is an offline BloodHound ingestor and LDAP result parser compatible with TrustedSec's ldapsearch BOF, the Python adaptation, pyldapsearch and Brute Ratel's LDAP Sentinel.
By parsing log files generated by the aforementioned tools, BOFHound allows operators to utilize BloodHound's beloved interface while maintaining full control over the LDAP queries being run and the spped at which they are executed. This leaves room for operator discretion to account for potential honeypot accounts, expensive LDAP query thresholds and other detection mechanisms designed with the traditional, automated BloodHound collectors in mind.
Check this PR to the SA BOF repo for BOFs that collect session and local group membership data and can be parsed by BOFHound.
Related Blogs
Blog - Granularize Your AD Recon Game
Blog - Granularize Your AD Recon Game Part 2
Installation
BOFHound can be installed with pip3 install bofhound
or by cloning this repository and running pip3 install .
Usage
Example Usage
Parse ldapseach BOF results from Cobalt Strike logs (/opt/cobaltstrike/logs
by default) to /data/
bofhound -o /data/
Parse pyldapsearch logs and only include all properties (vs only common properties)
bofhound -i ~/.pyldapsearch/logs/ --all-properties
Parse LDAP Sentinel data from BRc4 logs (will change default input path to /opt/bruteratel/logs
)
bofhound --brute-ratel
ldapsearch
Required Data
The following attributes are required for proper functionality:
samaccounttype
dn
objectsid
Some object classes rely on domain objects being populated within BOFHound. Domains can be queried with either of the following commands
ldapsearch (objectclass=domain) *,ntsecuritydescriptor
ldapsearch (distinguishedname=DC=windomain,DC=local) *,ntsecuritydescriptor
Example ldapsearch Queries
Get All the Data (Maybe Run BloodHound Instead?)
ldapsearch (objectclass=*) *,ntsecuritydescriptor
Retrieve All Schema Info
ldapsearch (schemaIDGUID=*) name,schemaidguid -1 "" CN=Schema,CN=Configuration,DC=windomain,DC=local
Retrieve Only the ms-Mcs-AdmPwd schemaIDGUID
ldapsearch (name=ms-mcs-admpwd) name,schemaidguid 1 "" CN=Schema,CN=Configuration,DC=windomain,DC=local
Retrieve Domain NetBIOS Names (useful if collecting data via netsession2/netloggedon2
BOFs)
ldapsearch (netbiosname=*) * 0 "" "CN=Partitions,CN=Configuration,DC=windomain,DC=local"
Versions
Check the tagged releases to download a specific version
- v0.3.0 and onward support session/local group data
- v0.2.1 and onward are compatible with BloodHound CE
- v0.2.0 is the last release supporting BloodHound Legacy
Development
bofhound uses Poetry to manage dependencies. Install from source and setup for development with:
git clone https://github.com/fortalice/bofhound
cd bofhound
poetry install
poetry run bofhound --help
References and Credits
- @_dirkjan (and other contributors) for BloodHound.py
- TrustedSec for CS-Situational-Awareness-BOF
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.