Tuesday, August 25, 2020

Goddi (Go Dump Domain Info) - Dumps Active Directory Domain Information



Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.

Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2

Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).

Linux
Tested on Kali Linux (go1.10 linux/amd64).
  • umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
  • make sure nothing is mounted at /mnt/goddi/
  • make sure to run with sudo

Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with sudo.
  • username: Target user. Required parameter.
  • password: Target user's password. Required parameter.
  • domain: Full domain name. Required parameter.
  • dc: DC to target. Can be either an IP or full hostname. Required parameter.
  • startTLS: Use to StartTLS over 389.
  • unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...

Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
  • Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
  • Users in priveleged user groups (DA, EA, FA).
  • Users with passwords not set to expire.
  • User accounts that have been locked or disabled.
  • Machine accounts with passwords older than 45 days.
  • Domain Computers.
  • Domain Controllers.
  • Sites and Subnets.
  • SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
  • Trusted domain relationships.
  • Domain Groups.
  • Domain OUs.
  • Domain Account Policy.
  • Domain deligation users.
  • Domain GPOs.
  • Domain FSMO roles.
  • LAPS passwords.
  • GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.


Related articles


  1. Hacking Tools Github
  2. World No 1 Hacker Software
  3. Hackers Toolbox
  4. Pentest Tools List
  5. Hacker Tools Apk Download
  6. Hacker Security Tools
  7. Pentest Recon Tools
  8. Hacker Tools 2020
  9. Hacking Tools Github
  10. Hacking Tools For Windows
  11. Hacker Tools Linux
  12. Hacking Tools Name
  13. New Hacker Tools
  14. Hacking Tools 2019
  15. Hack Tools For Pc
  16. Hacking Tools Software
  17. Termux Hacking Tools 2019
  18. Hacker Tools 2020
  19. Hacking Apps
  20. Tools 4 Hack
  21. Black Hat Hacker Tools
  22. Best Hacking Tools 2019
  23. Pentest Tools Review
  24. Tools For Hacker
  25. Hack Apps
  26. Easy Hack Tools
  27. Hacking Tools Windows 10
  28. Pentest Tools Website Vulnerability
  29. Hacker Tools
  30. Hacking Tools For Games
  31. Hak5 Tools
  32. Hacking Tools For Games
  33. Hacker Tools Linux
  34. Pentest Tools
  35. Hacking Tools
  36. Hack Tools Download
  37. Hacker Tools List
  38. How To Hack
  39. Tools 4 Hack
  40. Hack Tools For Ubuntu
  41. Hak5 Tools
  42. Blackhat Hacker Tools
  43. Hacking Tools For Beginners
  44. Hacking Tools Windows
  45. Hacker Tools Free Download
  46. Hacker Tools 2019
  47. Best Hacking Tools 2020
  48. Hacker Tool Kit
  49. Free Pentest Tools For Windows
  50. Hacking Tools For Kali Linux
  51. Pentest Tools Online
  52. Hacker Security Tools
  53. Hackrf Tools
  54. Free Pentest Tools For Windows
  55. Pentest Tools Free
  56. Pentest Tools Framework
  57. Hacking Tools For Beginners
  58. Pentest Tools Linux
  59. Android Hack Tools Github
  60. Hacking Tools Usb
  61. Pentest Tools Windows
  62. Hacking Tools Kit
  63. Pentest Tools Free
  64. Hack And Tools
  65. Pentest Tools Online
  66. Hack Tool Apk
  67. Hack Tools 2019
  68. Nsa Hack Tools
  69. Hacker Tools For Pc
  70. Hacker Tool Kit
  71. Pentest Tools Review
  72. Pentest Tools Bluekeep
  73. Hacker Security Tools
  74. Hacker Tools 2020

No comments:

Blog Archive

About Me

My photo
Mightier than the sword, my pen is.