Graph-Based Analysis • BloodHound • Attack Paths
BloodHound uses graph theory to visualize Active Directory relationships and uncover hidden attack paths. It maps users, groups, computers, ACLs, and session data to show how an attacker can escalate from compromised user to Domain Admin.
User → Group → Local Admin → DA Session → Domain Admin
User has GenericAll permission on another user → Reset password → Impersonate
Service account with SPN → Request TGS → Offline crack → Service Admin rights
Computer with unconstrained delegation → Force auth → Extract TGT → Impersonate
Visualize attack paths from compromised user to Domain Admin