Skip to main content
Applies to BloodHound Enterprise and CE JamfHound is an OpenGraph extension and data collector for JAMF Pro locally hosted and cloud environments that helps security professionals visualize and analyze their JAMF Pro configurations in BloodHound. It collects data about users, groups, sites, scripts, API integrations, and other entities within a JAMF Pro tenant and represents them as nodes and edges in BloodHound’s graph database.
The other main products in JAMF’s portfolio are JAMF Protect, JAMF Account, JAMF Now, and JAMF Connect. JamfHound does not currently support these products.

JAMF Pro Attack Paths

JAMF Pro is a highly valuable target for attackers in the modern enterprise. The privileged MDM actions required to administer Apple devices with JAMF Pro allow elevated access to local devices and complicates the jobs of EDRs and defensive teams trying to differentiate benign and malicious actions. Compromising a JAMF Pro tenant can provide attackers with a wide range of access to laterally move to Apple devices, exfiltrate information, lock or DOS devices, and more.
Example JamfHound graph
SpecterOps has identified and exploited numerous JAMF Pro misconfigurations and blind spots during red team engagements and penetration tests in hardened macOS client environments. One such attack path has been highlighted in the State of Attack Path Management (p 59,60). Our research on JAMF attack paths is still ongoing.

JAMF Pro Trial

JAMF Pro provides a free trial for organizations interested in testing their MDM capability.

References

We recommend reading the following posts and pages to learn more about potential JAMF Pro attack vectors:

Research Tools

Here are some interesting GitHub repositories related to JAMF Pro security research:

Community

Please join us in the #jamf channel of the BloodHound Community Slack workspace if you want to chat about attack paths in JAMF or the usage of JamfHound. You are also welcome to open an issue or pull request on GitHub.