A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
Read the associated blogpost: https://specterops.io/blog/2025/10/30/sharehound-an-opengraph-collector-for-network-shares/
- Map network shares of a domain and their rights in Bloodhound OpenGraph format
- Highly customizable rule matching system based on the ShareQL language
- Multithreaded discovery of shares in Breadth First Search
To help you get started, here are a set of quick start cypher queries for the most common needs:
The following query will allow you to find principals with full control access to a share
MATCH (p)-[r]->(s:NetworkShareSMB)
WHERE (p)-[:CanDelete]->(s)
AND (p)-[:CanDsControlAccess]->(s)
AND (p)-[:CanDsCreateChild]->(s)
AND (p)-[:CanDsDeleteChild]->(s)
AND (p)-[:CanDsDeleteTree]->(s)
AND (p)-[:CanDsListContents]->(s)
AND (p)-[:CanDsListObject]->(s)
AND (p)-[:CanDsReadProperty]->(s)
AND (p)-[:CanDsWriteExtendedProperties]->(s)
AND (p)-[:CanDsWriteProperty]->(s)
AND (p)-[:CanReadControl]->(s)
AND (p)-[:CanWriteDacl]->(s)
AND (p)-[:CanWriteOwner]->(s)
RETURN p,r,sThis will result in a graph similar to this one (I like to call it the Full Control Onion):
graph LR
S-1-5-21-3797563538-650367887-713497691-1106[S-1-5-21-3797563538-650367887-713497691-1106] -->| CanDelete | ExampleShare[ExampleShare]
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsControlAccess | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsCreateChild | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsDeleteChild | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsDeleteTree | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsListContents | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsListObject | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsReadProperty | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsWriteExtendedProperties | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanDsWriteProperty | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanReadControl | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanWriteDacl | ExampleShare
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanWriteOwner | ExampleShare
The following query will allow you to find files by name (case insensitive)
MATCH x=(p)-[r:CanWriteDacl|CanWriteOwner|CanDsWriteProperty|CanDsWriteExtendedProperties]->(s:NetworkShareSMB)
RETURN x This will result in a graph similar to this one:
graph LR
S-1-5-21-3797563538-650367887-713497691-1106[S-1-5-21-3797563538-650367887-713497691-1106] -->| CanWriteDacl | ExampleShare[ExampleShare]
S-1-5-21-3797563538-650367887-713497691-1106 -->| CanWriteOwner | ExampleShare
S-1-5-32-544[S-1-5-32-544] -->| CanWriteDacl | SYSVOL[SYSVOL]
S-1-5-32-544 -->| CanWriteOwner | SYSVOL
S-1-5-32-544 -->| CanWriteDacl | ExampleShare
S-1-5-32-544 -->| CanWriteOwner | ExampleShare
The following query will allow you to find files by name (case insensitive)
MATCH p=(h:NetworkShareHost)-[:HasNetworkShare]->(s:NetworkShareSMB)-[:Contains*0..]->(f:File)
WHERE toLower(f.name) = toLower("flag.txt")
RETURN pThis will result in a graph similar to this one:
graph LR
DC01[DC01] -->| HasNetworkShare | Test[Test]
Test -->| Contains | Dir1[Dir1]
Test -->| Contains | DirA[DirA]
DirA -->| Contains | flag.txtA[flag.txt]
Dir1 -->| Contains | Dir2[Dir2]
Dir2 -->| Contains | flag.txt1[flag.txt]
The following query will allow you to find files by extension (case insensitive)
MATCH p=(h:NetworkShareHost)-[:HasNetworkShare]->(s:NetworkShareSMB)-[:Contains*0..]->(f:File)
WHERE toLower(f.extension) = toLower(".vmdk")
RETURN pThis will result in a graph similar to this one:
graph LR
DC01[DC01] -->| HasNetworkShare | Test[Test]
Test -->| Contains | Dir1[Dir1]
Test -->| Contains | DirA[DirA]
DirA -->| Contains | SRV02.vmdkA[SRV02.vmdk]
Dir1 -->| Contains | Dir2[Dir2]
Dir2 -->| Contains | DC01.vmdk1[DC01.vmdk]
The following query will allow you to find files by name (case insensitive)
MATCH p=(h:NetworkShareHost)-[:HasNetworkShare]->(s:NetworkShareSMB)-[:Contains*0..]->(f:File)
WHERE toLower(f.extension) = toLower(".bat")
RETURN pThis will result in a graph similar to this one:
graph LR
DC01[DC01] -->| HasNetworkShare | Test[Test]
Test -->| Contains | Dir1[Dir1]
Test -->| Contains | DirA[DirA]
DirA -->| Contains | script.batA[script.bat]
Dir1 -->| Contains | Dir2[Dir2]
Dir2 -->| Contains | logon.bat1[logon.bat]
All node types and edges name are defined in the kinds.py file, so that you can easily find the name of these to create custom Cypher queries.
Pull requests are welcome. Feel free to open an issue if you want to add other features.