Transcript
A (0:00)
Foreign. And welcome to another soapbox edition of the Risky Business podcast. My name's Patrick Gray. For those who are not familiar, all of these soapbox editions of the show are wholly sponsored. And that means everyone you hear in one of these editions of the show paid to be here. And today we are chatting with the fine folks over at Spectrops, and they, of course, make Bloodhound. So joining me now is Jared Atkinson, who is the CTO and one of the founding team members of Bloodhound, which was spun out of Spectrops, which is a professional services company doing a lot of offensive security testing, things like that. Bloodhound started as a tool that they developed for their own use, and then of course, you know, they spun it all out so that everybody else could enjoy it as well. So for those who are not familiar, Jarrod, today we're going to be talking about Open Graph, right? Which is a big change for Bloodhound. But why don't we just start off by talking about, you know, the origins of Bloodhound, the brief history of Bloodhound, and how we got to the point where Open Graph is now a thing.
B (1:07)
Sure, yeah. So as you mentioned, we started off as kind of a red team, right? So consulting. And one of the things that you run into as a red teamer is when you're in a network environment, particularly like a gigantic ad domain or maybe ad forest with tons of different domains, you might have an objective and you have an arbitrary starting point. So you fish some user and you get access to their computer. Very rarely is that the place where you want to be. Right. You want to go somewhere else. And so there's, there's almost this kind of. Traditionally there's been this guess and check kind of approach, trial and error to where you get access to the one computer. Maybe you escalate to become system or have root level permissions. And then you would ask who's logged into the computer and what permissions do those users have have. Right. And so like, what computers can they administer and that type of thing. And so then you start to laterally move. The problem is, is that you might have several options at your disposal. And you're going to pick one or two of them and you're going to go down that path. And you're just kind of hoping that five hops down the road, you're getting to the. You're getting closer and closer to where you want to go. In sufficiently large environments, sometimes that doesn't work out the way that you hope. And then you have this kind of conundrum of, do I go all the way back to the beginning, do I go back one hop and try a different option? And there's kind of this enormous selection problem to where you have all these different options and you don't know which one to take. And so Bloodhound came about almost as like Google Maps, the Google Maps equivalent for navigating your way through a domain environment to where you would say, let's get initial access. We can gather a bunch of information about what computers, groups, users are in the domain. All of that any user in the domain can gather. And you can start to build out relationships and understand which path you want to take before you even start moving. Right? So you would understand, okay, the interstate, so to speak, to get from where I'm at to where I'm going is this one. And so I'm going to take that path and kind of follow that direction. And it kind of simplified that problem quite a bit. Now that's, that's kind of like the offensive use case. What we realized is that if attackers are using that and they know kind of where they're starting and where they're going, the defenders can, can do like kind of the inverse, which is, I know the resources that I want to protect. How do I flip that over and say, what are all the different routes that attackers can take from anywhere in the environment to get to this thing that I consider to be really important, right? And then, and then what you would do is you start remediating those permissions, right? So there's a lot of times you would have something like the authenticated users group would have admin over a domain controller, like all kinds of crazy configurations like that. Those configurations may survive in an environment for 15 years, nobody knows about it, and then a red team or finds it, right? What if we can just find that from the get go automatically in one, one quick step? Basically, it's kind of the general idea behind Bloodhound and then Bloodhound Enterprise.
