AzureHound
BloodHound's AzureHound (https://github.com/BloodHoundAD/AzureHound) supports Azure and Entra ID too to map attack paths. It uses Azure AD and Az PowerShell modules for gathering the data through its collectors.
1
Run the collector to gather data
Some examples of Cypher queries are below:
• Find all users who have the Global Administrator role
MATCH p =(n)-[r:AZGlobalAdmin*1..]->(m) RETURN p
• Find all paths to an Azure VM
MATCH p = (n)-[r]->(g: AZVM) RETURN p
• Find all paths to an Azure KeyVault
MATCH p = (n)-[r]->(g:AZKeyVault) RETURN p
• Find all paths to an Azure Resource Group
MATCH p = (n)-[r]->(g:AZResourceGroup) RETURN p
• Find Owners of Entra ID Groups
MATCH p = (n)-[r:AZOwns]->(g:AZGroup) RETURN p
Last updated