Cyber Research Wiki

BloodHound (Community Edition)

BloodHound is an open‑source tool from SpecterOps that applies graph theory to identity and access relationships to uncover attack paths (privilege escalation and lateral movement) across Microsoft Active Directory, Azure AD, and other platforms via an extension model.

Overview

BloodHound (Community Edition) is an identity attack path discovery and analysis platform used by red and blue teams to map feasible privilege escalation and lateral movement across enterprise identity systems. It is not a containment or EDR product; rather, it models identities, permissions, and sessions as a graph to expose abusable relationships and shortest paths to high‑value targets. Community Edition presents a web interface backed by a Go REST API, uses PostgreSQL for application metadata, and stores the identity graph in Neo4j. Data is gathered by official collectors—SharpHound for on‑premises Active Directory and AzureHound for Azure AD/Entra ID—and ingested for graph analytics. Support for platforms beyond Microsoft ecosystems is expanding via an extension model that shares lineage with the commercial BloodHound Enterprise.

What It Is

An open‑source identity graph analytics system that represents users, computers, groups, GPOs, service principals, and related permissions and sessions as nodes and edges. It enables pathfinding and query‑driven analysis to reveal shortest or otherwise tractable routes from ordinary principals to tier‑0 assets (for example, Domain Admin) and highlights misconfigurations and abusable rights. The tool is used both to validate offensive feasibility and to guide defensive hardening and risk reduction.

How It Works

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high