Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.
Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2
Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).
Linux
Tested on Kali Linux (go1.10 linux/amd64).
- umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
- make sure nothing is mounted at /mnt/goddi/
- make sure to run with
sudo
Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with
sudo
.- username: Target user. Required parameter.
- password: Target user's password. Required parameter.
- domain: Full domain name. Required parameter.
- dc: DC to target. Can be either an IP or full hostname. Required parameter.
- startTLS: Use to StartTLS over 389.
- unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...
Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
- Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
- Users in priveleged user groups (DA, EA, FA).
- Users with passwords not set to expire.
- User accounts that have been locked or disabled.
- Machine accounts with passwords older than 45 days.
- Domain Computers.
- Domain Controllers.
- Sites and Subnets.
- SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
- Trusted domain relationships.
- Domain Groups.
- Domain OUs.
- Domain Account Policy.
- Domain deligation users.
- Domain GPOs.
- Domain FSMO roles.
- LAPS passwords.
- GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.
Related articles
- Pentest Tools For Mac
- Hack Tools 2019
- Hacking Tools Windows 10
- Tools For Hacker
- Free Pentest Tools For Windows
- New Hacker Tools
- Termux Hacking Tools 2019
- Hack Tools For Games
- Hack Tools Pc
- Pentest Tools For Windows
- Hacker Hardware Tools
- Hack App
- Pentest Tools Download
- Pentest Tools Windows
- Pentest Tools Bluekeep
- Pentest Tools Framework
- Hacking Tools For Windows
- Tools For Hacker
- Hacking Tools For Beginners
- Hackers Toolbox
- Nsa Hacker Tools
- Hack Rom Tools
- Pentest Tools Android
- Hacking Tools Windows
- Hacking Tools Download
- Hack Tools
- New Hack Tools
- Bluetooth Hacking Tools Kali
- Blackhat Hacker Tools
- Hacking Tools For Windows 7
- Pentest Tools Port Scanner
- Hacker Tools For Pc
- Pentest Tools For Android
- Hacking Tools Kit
- Best Pentesting Tools 2018
- Hacker Tools Free Download
- Hacking Apps
- Pentest Tools Open Source
- Hack Tools Online
- Hacker Tools For Pc
- Underground Hacker Sites
- Hacking Tools Software
- Pentest Tools Website
- New Hack Tools
- Hacking Tools Online
- Hack Tools
- Pentest Tools Android
- Hacker Tools Hardware
- Pentest Tools
- Hack Tools For Ubuntu
- Hacking Tools Github
- Hacking Tools For Games
- Hack And Tools
- Best Hacking Tools 2019
- Hacking Tools Github
- Hack Tools For Games
- Github Hacking Tools
- Pentest Tools Url Fuzzer
- Hacking Tools For Windows
- Hacker Security Tools
- Hacker Tools List
- Hacker Tools Software
- Pentest Reporting Tools
- Pentest Tools Free
- Best Hacking Tools 2019
- New Hack Tools
- Hack Tools 2019
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Online
- Ethical Hacker Tools
- Hacking Apps
- Hacker Tools Github
- Black Hat Hacker Tools
- Best Hacking Tools 2019
- Blackhat Hacker Tools
- Hacker Tools
- Hacking Tools For Pc
- Hacking Tools For Kali Linux
- Nsa Hacker Tools
- Pentest Tools Website
- Termux Hacking Tools 2019
- Hacker Security Tools
- Termux Hacking Tools 2019
- Hacker Tools Online
- Hack Tools For Games
- Pentest Tools Url Fuzzer
- Pentest Tools For Ubuntu
- Free Pentest Tools For Windows
No comments:
Post a Comment