Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/AidenPearce369/ADReaper

A fast enumeration tool for Windows Active Directory Pentesting written in Go
https://github.com/AidenPearce369/ADReaper

Last synced: 21 days ago
JSON representation

A fast enumeration tool for Windows Active Directory Pentesting written in Go

Awesome Lists containing this project

README

        

# ADReaper

```ADReaper``` is a tool written in ```Golang``` which enumerates an Active Directory environment with LDAP queries within few seconds

## Installation

You can download precompiled executable binaries for Windows/Linux from [latest releases](https://github.com/AidenPearce369/ADReaper/releases/tag/ADReaper)

### Install from source

To build from source, clone the repo and build it with GO

```c
$ git clone https://github.com/AidenPearce369/ADReaper
$ cd ADReaper/
$ go build
```

## Usage

ADReaper performs enumeration with various commands that performs LDAP queries with respective to it

```c
PS C:\Users\redteamer\Desktop\shared> .\ADReaper.exe

-command string

Command to run
dc - to list domain controllers
domain-trust - to list domain trust
users - to list all users
computers - to list all computers
groups - to list all groups with members
spn - to list service principal objects
never-loggedon - to list users never logged on
gpo - to list group policy objects
ou - to list organizational units
ms-sql - to list MS-SQL servers
asreproast - to list AS-REP roastable accounts
unconstrained - to list Unconstrained Delegated accounts
admin-priv - to list AD objects with admin privilege

-dc string

Enter the DC

-filter string

Filters to use for users/groups/computers

list - lists all objects only
full-data - list all objects with properties
membership - lists all members from an object

(default "list")
-name string

Pass object name of user/group/computer

-password string

Enter the Password

-user string

Enter the Username
```

To query the properties of ```Domain Controller``` of the domain,

```c
.\ADReaper.exe -dc -user -password -command dc
```

To query the ```Trust Attributes``` of the domain,

```c
.\ADReaper.exe -dc -user -password -command domain-trust
```

To list all ```Users``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command users
```

To list all ```Users``` with attributes from the domain,

```c
.\ADReaper.exe -dc -user -password -command users -filter full-data
```

To list attributes of ```Specific Users``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command users -name
```

To list the membership of the Specific User,

```c
.\ADReaper.exe -dc -user -password -command users -name -filter membership
```

To list all available ```Computers``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command computers
```

To list all ```Computers``` with attributes from the domain,

```c
.\ADReaper.exe -dc -user -password -command computers -filter full-data
```

To list attributes of ```Specific Computer``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command computers -name
```

To list all available ```Groups``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command groups
```

To list all ```Groups``` with attributes from the domain,

```c
.\ADReaper.exe -dc -user -password -command groups -filter full-data
```

To list attributes of ```Specific Group``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command groups -name
```

To list members of ```Specific Group``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command groups -name -filter membership
```

To list users ```Never Logged On``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command never-loggedon
```

To list ```GPOs``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command gpo
```

To list ```OUs``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command ou
```

To list AD objects with higher privileges,

```c
.\ADReaper.exe -dc -user -password -command admin-priv
```

To list ```MS-SQL Servers``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command ms-sql
```

To list all attributes of ```MS-SQL Servers``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command ms-sql -filter full-data
```

To list all attributes of specific ```MS-SQL Server``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command ms-sql -name
```

To list ```SPNs``` available in the domain,

```c
.\ADReaper.exe -dc -user -password -command spn
```

To list all attributes of ```Specific SPN``` from the domain,

```c
.\ADReaper.exe -dc -user -password -command spn -name
```

To list AD objects with ```Unconstrained Delegation``` enabled,

```c
.\ADReaper.exe -dc -user -password -command unconstrained
```

## To-Do

Looking forward for contributors to build the next version

Planned features,
- Custom LDAP querying
- Filters LDAP attributes with existing commands
- LAPS enumeration
- Kerberoasting SPNs
- AS-REP Roasting SPNs
- Local admin access hunting
- ACL enumeration
- Exporting JSON data for BloodHound

If interested, ping me :)