Skip to content

Conversation

@carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

🎯 Content Summary

AnsibleHound: BloodHound OpenGraph Collector for Ansible

AnsibleHound is a BloodHound OpenGraph collector for Ansible WorX and Ansible Tower, implemented in Go to map your organization’s structure and permissions into a BloodHound attack-path graph. By leveraging a user-generated Read-only API token, it enumerates all accessible resources and relationships via the Tower REST API, enabling security teams or attackers to visualize permission chains and identif...

🔧 Technical Details

AnsibleHound exploits Ansible Tower’s REST API with a least-privileged Read token to perform comprehensive enumeration: it traverses endpoints such as /api/v2/organizations/, /inventories/, /hosts/, /job_templates/, /projects/, /credentials/, /users/ and /teams/, handling JSON pagination and nested links to extract object IDs, names, and scopes, thereby revealing the full structure and acce...

🤖 Agent Actions

Added comprehensive coverage of AnsibleHound enumeration technique to existing Ansible Tower / AWX security page:

  1. Added “Enumeration & Attack-Path Mapping with AnsibleHound” section:
    • Explains enumeration via Read-only token
    • Step-by-step build & run commands
    • Lists enumerated REST endpoints
    • Details BloodHound transformation (node/edge types)
    • Defensive & offensive considerations

  2. Created “## References” block with links to AnsibleHound repo and BloodHound.

  3. Preserved existing content; banner kept at bottom.

No new file creation was required—content integrated into
src/pentesting-ci-cd/ansible-tower-awx-automation-controller-security.md

✅ Review Checklist

  • Content is technically accurate
  • Formatting follows HackTricks style guidelines
  • Links and references are working
  • Content adds educational value
  • No sensitive information is exposed

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

📚 Repository Maintenance

  • MD files processed: 519
  • MD files fixed: 45

All .md files have been checked for proper formatting (headers, includes, etc.).

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://github.com/TheSleekBoyCompany/AnsibleHound

Content Categories: Based on the analysis, this content was categorized under "pentesting-ci-cd/ansible-tower-security.md".

Repository Maintenance:

  • MD Files Formatting: 519 files processed (45 files fixed)

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop carlospolop merged commit 3903267 into master Aug 1, 2025
@carlospolop carlospolop deleted the update_AnsibleHound___BloodHound_Collector_for_Ansible_Wo_20250801_015104 branch August 1, 2025 09:55
github-actions bot pushed a commit that referenced this pull request Aug 29, 2025
…oodHound_Collector_for_Ansible_Wo_20250801_015104

AnsibleHound – BloodHound Collector for Ansible WorX and Tow...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants