SpecterOps BloodHound Enterprise
What is it?
BloodHound Enterprise is an attack path management tool for Active Directory and Entra ID (formerly Azure AD) environments. It ingests data from your directory services, builds a graph of all identities, permissions, group memberships, GPO applications, and trust relationships, then computes every attack path from any user or computer to your most critical assets (domain controllers, tier zero servers, global admin roles, tenant objects).
The open source version of BloodHound has been used by penetration testers for years to find attack paths during engagements. BloodHound Enterprise is the defensive counterpart: it enumerates paths continuously, measures overall exposure as a percentage, and provides specific remediation steps to eliminate those paths.
How does attack path analysis work?
BloodHound Enterprise collects data from Active Directory and Entra ID via collectors. It builds a directed graph where nodes are principals (users, computers, groups, service principals, app registrations) and edges are privileges or relationships (local admin, group membership, GPO application, credential access, Entra ID role assignments, MS Graph app roles).
The platform then computes all paths from every principal to designated tier zero assets. It ranks remediations by impact: which single configuration change will eliminate the most paths. This converts what would be an overwhelming number of findings into a prioritised list of specific actions.
A typical first finding: a GPO controlled by “Authenticated Users” (every account in the forest) that applies to a tier zero server like an Azure AD Connect box. Removing that one permission takes 30 minutes and can eliminate thousands of attack paths.
What does it find in Entra ID?
Entra ID introduces attack paths that do not exist in on-prem AD. The main concern is OAuth application permissions. App registrations can hold credentials, and service principals (the instantiation of an app in a tenant) can be granted MS Graph app roles that are equivalent to global admin.
The critical permission is “AppRoleAssignment.ReadWrite.All”, which allows an application to grant other applications high-privilege app roles, bypassing the admin consent process that normally requires a human to click a button in the Azure portal. This is the mechanism Russia’s SVR (Midnight Blizzard) used in the 2024 Microsoft breach: they added a credential to a test tenant app registration, used its cross-tenant service principal with elevated privileges to grant further apps access to Exchange Web Services, and read executive email inboxes.
BloodHound Enterprise surfaces which applications in your tenant hold these dangerous permissions and shows the full chain of who can control those app registrations (through Entra ID roles, ownership, or service principal permissions).
What does a typical remediation look like?
Most remediations are small configuration changes, not architectural overhauls:
- Remove “Authenticated Users” from GPO ACLs that apply to tier zero assets
- Remove unnecessary local admin group memberships on servers
- Reduce MS Graph app roles on service principals to least privilege
- Audit and cull foreign app registrations with elevated Entra ID permissions
SpecterOps reports that customers can reach 0% exposure (zero attack paths to any tier zero asset). The first deployment typically reveals what SpecterOps calls “20 years of misconfiguration debt”, but the highest-impact changes are often trivial to implement.
What does it cost?
Pricing starts at approximately $20,000 per year. Large enterprises with 50,000 to 100,000 users typically pay between $100,000 and $300,000 per year.
What does it not do?
BloodHound Enterprise maps attack paths in Active Directory and Entra ID. It does not cover cloud infrastructure permissions (AWS IAM, GCP IAM) or SaaS application permissions outside of the Microsoft identity ecosystem. SpecterOps is working on cross-platform attack path analysis via BloodHound’s OpenGraph capability.
Risky Business appearances
- Soap Box: A deep dive on how Russia’s SVR is hacking Microsoft 365 tenants (Feb 2024)
- Sponsored: SpecterOps on identities at rest and identities in transit (Sep 2025)
- Risky Business #775: Cl0p is back, SEC hack disclosures disappoint (sponsor segment)
- Risky Business #760: Microsoft to make MFA mandatory (sponsor segment)
- Snake Oilers: ConductorOne, Bloodhound Enterprise and Zero Networks (Sep 2023)
- BloodHound Enterprise video demo
Sources
- Soap Box: A deep dive on how Russia’s SVR is hacking Microsoft 365 tenants, primary interview with Andy Robbins
- Snake Oilers: ConductorOne, Bloodhound Enterprise and Zero Networks, product pitch with Justin Kohler
- bloodhoundenterprise.io
SpecterOps is a recurring Risky Business sponsor.
Bloodhound Enterprise
Attack Path Management Solution