Academy

Module 3 Β· BloodHound β€” Graph Theory Meets AD πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

BloodHound changed offensive AD. Before BloodHound (2016, by SpecterOps), attack paths were discovered manually by experienced operators. After BloodHound, any pentester with domain user credentials runs a data collection + GUI query and has the shortest path to Domain Admin visualized in minutes. This module explains why BloodHound works β€” graph theory applied to AD’s inherent relationships β€” and why the visualization is often more valuable than the exploitation.

Why this matters

AD is a graph. Users are in groups. Groups contain other groups. Computers are owned by principals. Principals have ACL rights on objects. Delegation exists between principals and SPNs. Trusts connect forests. Every object has a permission (ACL) relationship with every other.

Before BloodHound, most defenders assumed their domain was a forest of trees: users β†’ groups β†’ rights. But AD has thousands of ACL-based edges. WriteDacl, GenericAll, GenericWrite, WriteOwner β€” any of these on a sensitive target is a privilege escalation path. Graph theory finds paths across these edges in milliseconds.

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 33% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
3 more sections locked below