Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.
Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2
Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).
Linux
Tested on Kali Linux (go1.10 linux/amd64).
- umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
- make sure nothing is mounted at /mnt/goddi/
- make sure to run with
sudo
Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with
sudo
.- username: Target user. Required parameter.
- password: Target user's password. Required parameter.
- domain: Full domain name. Required parameter.
- dc: DC to target. Can be either an IP or full hostname. Required parameter.
- startTLS: Use to StartTLS over 389.
- unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...
Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
- Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
- Users in priveleged user groups (DA, EA, FA).
- Users with passwords not set to expire.
- User accounts that have been locked or disabled.
- Machine accounts with passwords older than 45 days.
- Domain Computers.
- Domain Controllers.
- Sites and Subnets.
- SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
- Trusted domain relationships.
- Domain Groups.
- Domain OUs.
- Domain Account Policy.
- Domain deligation users.
- Domain GPOs.
- Domain FSMO roles.
- LAPS passwords.
- GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.
More info
- Hacker Tools Mac
- Game Hacking
- Hacking Tools Free Download
- What Are Hacking Tools
- Hack Rom Tools
- Pentest Tools Kali Linux
- Hacking Tools Kit
- Hacker Tools Hardware
- Hacking Tools Usb
- Hacker Tools For Pc
- Hackers Toolbox
- Tools 4 Hack
- Pentest Tools For Windows
- Pentest Automation Tools
- Free Pentest Tools For Windows
- Hacker Tools Apk Download
- Pentest Tools Port Scanner
- Hacking Tools Kit
- Hacking Tools 2019
- Usb Pentest Tools
- Blackhat Hacker Tools
- Hacker Tools Windows
- What Are Hacking Tools
- Pentest Tools Open Source
- How To Hack
- Pentest Tools For Ubuntu
- Hacker Tools Mac
- Hacking Tools Name
- Hak5 Tools
- Hacker Tools Github
- Hacking App
- Pentest Tools Alternative
- Pentest Box Tools Download
- Pentest Tools List
- Pentest Tools Kali Linux
- Hacker Tools Windows
- Hack Tools Online
- Hack Rom Tools
- Nsa Hack Tools Download
- Github Hacking Tools
- Pentest Tools Review
- Hacking Tools And Software
- Pentest Tools Download
- What Are Hacking Tools
- Pentest Tools For Mac
- How To Install Pentest Tools In Ubuntu
- Hack Tool Apk No Root
- Hacking Tools Windows 10
- Pentest Tools Bluekeep
- Pentest Tools Find Subdomains
- Hacking Tools
- Best Pentesting Tools 2018
- Pentest Tools Free
- Hacks And Tools
- Hacking Tools Pc
- Nsa Hack Tools Download
- Hacking Tools Online
- Hack Tools For Windows
- Pentest Tools Website Vulnerability
- Pentest Tools Nmap
- Underground Hacker Sites
- Best Hacking Tools 2019
- Hacking Tools For Pc
- Hacking Tools 2020
- Hacking Tools For Windows 7
- Nsa Hacker Tools
- Hacker Tools Free
- Hacker Tools Online
- Hacker Tools Apk Download
- Hacker Tool Kit
- Hacking Tools For Mac
- Hacker Tools For Windows
- Hack Tools Pc
- Hacking Apps
- Hack Tools For Windows
- Hacking Tools Windows
- Pentest Tools Framework
- Hacking App
- Hacking Tools Software
- Github Hacking Tools
- Hacker Tools Hardware
- Pentest Tools Alternative
- Pentest Tools Url Fuzzer
- Hacking Tools 2020
- Hacker Tools For Mac
- Best Hacking Tools 2020
- Hacking Tools For Games
- Hacking Apps
- Hack Tools Mac
- Hacker Tool Kit
- Hacking Tools 2019
- Tools For Hacker
- Pentest Reporting Tools
- Underground Hacker Sites
- Hacking Tools And Software
- Hacking Tools Usb
- Pentest Tools For Ubuntu
- Hacker Techniques Tools And Incident Handling
- New Hacker Tools
- Pentest Tools Framework
- Hacking Tools Software
- Hacker Tools For Mac
- Hacker Tools Apk Download
- Hacking App
- Pentest Tools For Ubuntu
- Usb Pentest Tools
- Blackhat Hacker Tools
- Best Hacking Tools 2020
0 comments:
Post a Comment