Skip to content

Update for SO-CON 2026#53

Merged
martinsohn merged 111 commits intomainfrom
so-con-2026
Apr 15, 2026
Merged

Update for SO-CON 2026#53
martinsohn merged 111 commits intomainfrom
so-con-2026

Conversation

@martinsohn
Copy link
Copy Markdown
Collaborator

Overview

This PR significantly expands the BloodHound Query Library with new security assessment queries and comprehensive tool mappings (PurpleKnight, Nessus, PingCastle). The changes focus on Tier Zero governance, cloud security, and attack path analysis.

Query Changes

✨ New Queries Added (38)

🔄 Renamed Queries (3)

✏️ Updated Queries (18)

Assessment Tool Mappings

  • PurpleKnight: 50+ mappings for Entra/hybrid security findings
    • AD Certificate Authority with Web Enrollment - ESC8
    • AD objects created within the last 10 days
    • AD privileged users that are synced to Entra ID
    • Accounts with Constrained Delegation configured to krbtgt
    • Accounts with Kerberos constrained delegation configured to SSO computer account
    • Admins with old passwords
    • Anonymous NSPI access to AD enabled
    • Anonymous access to Active Directory enabled
    • Built-in domain Administrator account used within the last two weeks
    • Built-in domain Administrator account with old password (180 days)
    • Built-in guest account is enabled
    • Certificate templates that allow requesters to specify a subjectAltName
    • Certificate templates with 3 or more insecure configurations
    • Changes to MS LAPS read permissions
    • Changes to Pre-Windows 2000 Compatible Access Group membership
    • Computer Accounts in Privileged Groups
    • Computer account takeover through Kerberos Resource-Based Constrained Delegation (RBCD)
    • Computer or user accounts with SPN that have unconstrained delegation
    • Computers with older OS versions
    • Computers with password last set over 90 days ago
    • Dangerous Trust Attribute Set
    • Dangerous control paths expose certificate containers
    • Dangerous control paths expose certificate templates
    • Distributed COM Users group or Performance Log Users group are not empty
    • Domain Controller owner is not an administrator
    • Domain Controllers that have not authenticated to the domain for more than 45 days
    • Domain Controllers with Resource-Based Constrained Delegation (RBCD) enabled
    • Domain Controllers with old passwords
    • Domain trust to a third-party domain without quarantine
    • Domains with obsolete functional levels
    • Enabled admin accounts that are inactive
    • Enterprise Key Admins with full access to domain
    • Entra Connect sync account password reset
    • Entra ID privileged users that are also privileged in AD
    • Foreign Security Principals in Privileged Group
    • Forest contains more than 50 privileged accounts
    • GPO linking delegation at the domain controller OU level
    • GPO linking delegation at the domain level
    • Global Administrators that signed in during the last 14 days
    • Guest accounts that were inactive for more than 30 days
    • Guest invites not accepted in last 30 day
    • Hybrid-synced privileged role accounts
    • Inheritance enabled on AdminSDHolder object
    • Kerberos KRBTGT account with old password
    • LDAP signing is not required on Domain Controllers
    • Less than 2 Global Administrators exist
    • More than 10 Privileged Administrators exist
    • More than 5 Global Administrators exist
    • Non-default principals with DC Sync rights on the domain
    • Non-privileged users with access to gMSA passwords
    • OU permissions enabling BadSuccessor dMSA escalation
    • Objects in privileged groups without adminCount=1 (SDProp)
    • Objects with constrained delegation configured
    • Operator groups no longer protected by AdminSDHolder and SDProp
    • Operators Groups that are not empty
    • Outbound forest trust with SID History enabled
    • Permission changes on AdminSDHolder object
    • Primary users with SPN not supporting AES encryption on Kerberos
    • Principals with constrained authentication delegation enabled for a DC service
    • Principals with constrained delegation using protocol transition enabled for a DC service
    • Privileged accounts with a password that never expires
    • Privileged accounts with mailbox
    • Privileged group contains guest account
    • Privileged objects with unprivileged owners
    • Privileged users that are disabled
    • Privileged users with SPN defined
    • Prohibited Entra ID Roles Assigned
    • Protected Users group not in use
    • RC4 or DES encryption type are supported by Domain Controllers
    • Recent privileged account creation activity
    • Resource Based Constrained Delegation applied to AZUREADSSOACC account
    • SMB Signing is not required on Domain Controllers
    • SSO computer account with password last set over 90 days ago
    • Shadow Credentials on privileged objects
    • Smart card password rotation disabled
    • Suspicious Directory Synchronization Accounts role member
    • Unprivileged accounts with adminCount=1
    • Unprivileged owner of a privileged group
    • Unprivileged principals as DNS Admins
    • Unprivileged users can add computer accounts to the domain
    • User accounts that store passwords with reversible encryption
    • User accounts that use DES encryption
    • User accounts using Smart Card authentication with old password
    • User accounts with password not required
    • Users and computers with non-default Primary Group IDs
    • Users or devices inactive for at least 90 days
    • Users with Kerberos pre-authentication disabled
    • Users with Password Never Expires flag set
    • Users with SPN defined
    • Users with old passwords
    • Users with the attribute userPassword set
    • Well-known privileged SIDs in SIDHistory
    • Write access to RBCD on DC
    • gMSA not in use
    • gMSA objects with old passwords
    • krbtgt account with Resource-Based Constrained Delegation (RBCD) enabled
  • Nessus: Added scanning IDs
  • PingCastle: One scope change

Documentation

…t mappings for it

- Remove Tier Zero condition
- Map to PingCastle
- Change PingCastle to Exact mapping
…ccounts with Constrained Delegation configured to krbtgt"
martinsohn and others added 23 commits March 20, 2026 20:00
… computers, including rights derived through nested group memberships"
Support for Domain Computer, Domain Controllers, and RODC groups in one query
@martinsohn martinsohn requested a review from d3vzer0 April 15, 2026 11:30
@martinsohn martinsohn added bug Something isn't working documentation Improvements or additions to documentation enhancement New feature or request labels Apr 15, 2026
@martinsohn martinsohn merged commit 93706e1 into main Apr 15, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bug Something isn't working documentation Improvements or additions to documentation enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants