Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/SecuProject/ADenum
AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
https://github.com/SecuProject/ADenum
enumeration kerberos ldap pentesting python
Last synced: 3 months ago
JSON representation
AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
- Host: GitHub
- URL: https://github.com/SecuProject/ADenum
- Owner: SecuProject
- License: gpl-3.0
- Created: 2020-09-27T13:47:04.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2023-07-04T09:00:17.000Z (over 1 year ago)
- Last Synced: 2024-06-06T20:05:22.096Z (5 months ago)
- Topics: enumeration, kerberos, ldap, pentesting, python
- Language: Python
- Homepage:
- Size: 162 KB
- Stars: 275
- Watchers: 7
- Forks: 55
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - SecuProject/ADenum - AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos. (Python)
README
# Active directory enumeration - `ADEnum.py`
**ADEnum.py** is a pentesting tool that allows to find misconfiguration through the protocol LDAP and exploit some of those weaknesses with Kerberos.
```text
█████╗ ██████╗ ███████╗███╗ ██╗██╗ ██╗███╗ ███╗
██╔══██╗██╔══██╗ ██╔════╝████╗ ██║██║ ██║████╗ ████║
███████║██║ ██║ █████╗ ██╔██╗ ██║██║ ██║██╔████╔██║
██╔══██║██║ ██║ ██╔══╝ ██║╚██╗██║██║ ██║██║╚██╔╝██║
██║ ██║██████╔╝ ███████╗██║ ╚████║╚██████╔╝██║ ╚═╝ ██║
╚═╝ ╚═╝╚═════╝ ╚══════╝╚═╝ ╚═══╝ ╚═════╝ ╚═╝ ╚═╝usage: ADenum.py -d [domain] -u [username] -p [password]
Pentest tool that detect misconfig in AD with LDAP
options:
-h, --help show this help message and exit
-d [domain] The name of domain (e.g. "test.local")
-u [username] The user name
-p [password] The user password
-ip [ipAddress] The IP address of the server (e.g. "1.1.1.1")
-j Enable hash cracking (john)
-jp [path] John binary path
-w [wordList] The path of the wordlist to be used john (Default: /usr/share/seclists/Passwords/Leaked-
Databases/rockyou.txt
-v, --version Show program's version number and exit
-s Use LDAP with SSL
-c, --NPUsersCheck Check with GetNPUsers.py for ASREP Roastable
```## Requirement
- Impacket ()
- John ()
- Python 3
- If you are using **debian** or **ubuntu**:```bash
$ sudo apt-get install libsasl2-dev python-dev libldap2-dev libssl-dev
```- If you are using **kali**:
```bash
$ sudo apt-get install libsasl2-dev python2-dev libldap2-dev libssl-dev
```
- pip3:```bash
$ pip3 install -r requirements.txt
```## Features and Functionality
### LDAP
- Enum Domain Admin users
- Enum Domain Controllers
- Enum Domain users with Password Not Expire
- Enum Domain users with old password
- Enum Domain users with interesting description
- Enum Domain users with not the default encryption
- Enum Domain users with Protecting Privileged Domain Accounts
- Enum Domain users with not default object Attributes### Kerberos
- AS-REP Roastable
- Kerberoastable
- Password cracking with john (krb5tgs and krb5asrep)## Demo
[![asciicast](https://asciinema.org/a/362017.svg)](https://asciinema.org/a/362017?autoplay=1)
## Microsoft Advanced Threat Analytics
ATA detects two suspicious events but does **not** trigger an **alert**:
- The connection with the protocol LDAP without SSL
- The Kerberoastable attackAs shown in this screenshot:
![image/ATAdetection.png](image/ATAdetection.png)
## Source
Documentation:
-
-
-Impacket:
-
-## Legal Disclaimer
```text
This project is made for educational and ethical testing purposes only. Usage of this software for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state and federal laws.
Developers assume no liability and are not responsible for any misuse or damage caused by this program.
```