Attack Path
A chain of abusable privileges and user behaviors that create direct and indirect connections between principals. In BloodHound, Attack Paths are visualized in the graph by nodes and edges. Learn more in What is Attack Path Management.- Identity-based Attack Path—An Attack Path is based on identity or an already authenticated principal. BloodHound’s main goal is to help visualize and manage Attack Paths.
Attack Path Management (APM)
The process of identifying, analyzing, and managing the Attack Paths that an adversary might exploit to reach high-value objects or compromise the network’s security. BloodHound helps visualize and manage Attack Paths through Attack Path Management.Automatic Certification
A rule setting that determines how objects matching the rule criteria are certified. Can be configured as:- Direct Objects (only directly matched objects are certified automatically, excluding expansion results)
- All Objects (all objects including those from expansion are certified automatically)
- Off (all certification is manual). See also Certification.
Certification
An optional process in BloodHound Enterprise that interrupts automatic inclusion of objects in a zone by requiring manual approval before objects are fully recognized within the zone. Can be configured as automatic to allow certain objects to be certified without manual review.Choke Point
A privilege or user behavior (called edges) that, like the driveway to a house, connects the rest of the environment through an object or collection of objects (called nodes). For example, any Edge into the collection of Tier Zero nodes is a Tier Zero Choke Point. This is a privilege or user behavior the adversary must abuse to compromise a Tier Zero object. Choke points are significant points of control and defense in the network security architecture. They represent the optimal location to block the largest number of Attack Paths. BloodHound Enterprise calculates exposure for all choke points.Collector
A collector, collector client, or data collector is software that collects Attack Path-related data from a directory. For example, SharpHound and AzureHound.Custom Glyph
A visual indicator that can be applied to zones to distinguish objects within that zone on the Explore page.Cypher
Cypher is a graph query language used to interact with BloodHound’s database. It’s similar to SQL for traditional databases. To use it, see Searching with Cypher.Directory
A service that stores identities and their attributes, such as Active Directory (AD) and Entra ID (formerly Azure Active Directory). BloodHound collects data from these directories to build its graph of nodes and edges.Edge
An edge is part of the graph construct and represents a relationship between two nodes, indicating some form of interaction. See About BloodHound Edges.Enterprise Access Model (EAM)
A security framework developed by Microsoft that defines a privileged access strategy[1] with the ultimate goal of preventing privilege escalation through identity-based Attack Paths. In most cases, EAM supersedes and replaces tiering.Escalation (ESC)
The process of exploiting vulnerabilities or misconfigurations to gain higher privileges or access levels than initially granted. In BloodHound, escalation encompasses various techniques an attacker can use to move from lower-privileged principals to higher-privileged ones or sensitive objects. BloodHound detects and visualizes escalations as Attack Paths to help organizations identify and remediate privilege escalation risks.Expansion
The automatic process by which BloodHound includes additional objects in a zone based on rule criteria. For example, unrolling group memberships to identify nested objects and tag them as zone members.Exposure
A risk measurement that quantifies the extent to which principals in a directory have Attack Paths to Tier Zero objects. It encompasses both principals with one-step paths (UserA -[ForceChangePassword]-> TierZero), and multi-step paths (UserA -[ForceChangePassword]-> UserB -[GenericAll]-> TierZero). Exposure is measured in two ways:
- Exposure count—The number of principals with a Tier Zero Attack Path.
- Exposure percentage—The percentage of principals in the directory with a Tier Zero Attack Path.
Finding
A specific instance of a vulnerability that an attacker could abuse to gain access to, and eventually take control of, a network. Each finding can be categorized as a specific Attack Path type. There are two types of findings in BloodHound:- List-based finding—A finding for a specific principal where the vulnerability is related to the principal itself, such as a misconfiguration. Because of this nature, list-based findings do not necessarily have an exposure metric, but they will have an impact metric.
- Relationship-based finding—A finding for a pair of principals—a target that is privileged (such as belonging to Tier Zero) and a source/origin that is not—that can be compromised by one or more connections between said principals. Each relationship-based finding may be composed of one or many individual Attack Paths. A relationship-based finding can have an exposure metric (the exposure risk of the source/origin principal being compromised) and an impact metric (the impact risk of the target principal being compromised).
FOSS
Stands for Free and Open Source Software. For example, “BloodHound CE is a FOSS project.”Graph
The graph database used by BloodHound. It stores the relationships between nodes and edges and feeds BloodHound functionality like visualizing and understanding complex Attack Paths and environment risks.History Log
An audit log in Zone Builder that tracks changes made to zones and labels over time, including who made the change and when.Impact
A risk measurement that quantifies how much control of your environment an affected asset has. Specifically:- Impact count—The number of principals/objects that could be compromised through an Attack Path.
- Impact percentage—The percentage of the environment that could be impacted by a specific identity vulnerability.