Cloud Discovery With AzureHound #227
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the post covers
Unit 42 (published Oct 24, 2025) dissects AzureHound, a Go-based data collector in the BloodHound suite that enumerates Microsoft Entra ID and Azure via Microsoft Graph and Azure REST (ARM) APIs. The article explains how the tool works, how threat actors misuse it post-compromise, what API calls and user agents it generates, where it does and does not log, and how to hunt and mitigate its use.
Tool background and operating model
• Language/OS: ...
🔧 Technical Details
Cloud-wide enumeration via public APIs
Authenticate with any available credential artifact (passwords, refresh/JWT tokens, service principal secrets/certs) and run
azurehound list <object>remotely against Graph/ARM to collect users, groups, roles, assignments, subscriptions, RGs, VMs, Key Vaults, storage accounts/containers, and PaaS services. Ingest JSON into BloodHound to compute identity/resource attack paths.Privilege mapping through roles and groups
Use
list groups,list roles,list group-members, and*-role-assignmentsto surface direct and inherited high-privilege identities (e.g., Global Administrator) and identify escalation chains (nested groups, mis-scoped assignments).Data targeting and exfil preparation
Enumerate
list storage-accounts/list storage-containersto find blob endpoints (https://<acct>.blob.core.windows.n...🤖 Agent ActionsI explored the HackTricks repository and found the best place to incorporate the AzureHound enumeration, behavior, and OPSEC/logging details is:
What I updated
Changes committed:
Changes committed:
Why this is necessary
References added
No new files were needed; content was integrated into the most relevant existing pages as requested.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).