ShareHound An OpenGraph Collector for Network Shares #1540
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is: ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise that discovers SMB network shares across an AD domain, traverses files/folders, captures permissions, and outputs a JSON graph for ingestion into BloodHound. Repos: ShareHound (collector), ShareQL (DSL), and ShareQL VSCod...
🔧 Technical Details
IO-bound share crawling at scale: Treat each SMB share as the unit of work to maximize concurrency, but enforce per-host concurrency caps, throttle requests, and reuse SMB connections to avoid overwhelming servers while reducing latency.
Policy-driven traversal with a DSL: Use a firewall-style, first-match-wins ShareQL to allow/deny exploration by host/share/path and set per-rule depth limits, enabling targeted, fast crawls (e.g., only shares with names matching “backup”, depth ≤ 2).
Graph analytics of share permissions: Model hosts, shares, and files, and derive edges representing rights (e.g.,
CanWriteDacl,CanWriteOwner, directory-service write rights). Query principals with write-equivalent or FULL_CONTROL to pinpoint misconfigurations usable for ransomware staging or lateral movement.File hunting via extensions: Traverse
Containsedges and...🤖 Agent Actions
I analyzed the SpecterOps blog on ShareHound and found that HackTricks’ best place to integrate this is under network services pentesting for SMB enumeration and share crawling. I updated the SMB page to include ShareHound as a modern OpenGraph collector for domain share discovery and BloodHound ingestion, including usage, ShareQL policy-driven traversal, scaling safeguards, and BloodHound attack-surface Cypher queries.
What I changed
Why here
No other files were modified.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.