https://github.com/mordavid/pre2kfromdcsync
Pre2KfromDCSync detects machine accounts with Pre-Windows 2000 passwords and outputs the account name, stored NT hash, and potential password from DCSync output.
https://github.com/mordavid/pre2kfromdcsync
dcsync
Last synced: 11 months ago
JSON representation
Pre2KfromDCSync detects machine accounts with Pre-Windows 2000 passwords and outputs the account name, stored NT hash, and potential password from DCSync output.
- Host: GitHub
- URL: https://github.com/mordavid/pre2kfromdcsync
- Owner: MorDavid
- Created: 2024-10-10T05:41:27.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2025-01-05T07:01:20.000Z (over 1 year ago)
- Last Synced: 2025-05-18T22:13:21.822Z (12 months ago)
- Topics: dcsync
- Language: Python
- Homepage: https://www.mordavid.com
- Size: 10.7 KB
- Stars: 0
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
The script detects machine accounts with Pre-Windows 2000 passwords and outputs the account name, stored NT hash, and potential password.
## Security Impact
Machine accounts with Pre-Windows 2000 passwords are vulnerable to:
- Easy password guessing
- Lateral movement in Active Directory environments
- Potential privilege escalation
- Network resource access exploitation
## Remediation
If vulnerable accounts are found:
1. Reset the machine account passwords
2. Ensure proper machine account password policies are enforced
3. Implement modern security practices for machine authentication
4. Monitor for any unauthorized access attempts
## Disclaimer
This tool is intended for authorized security testing and auditing purposes only. Always ensure proper authorization before conducting security assessments. The author is not responsible for any misuse or damage caused by this tool.