Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.
Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2
Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).
Linux
Tested on Kali Linux (go1.10 linux/amd64).
- umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
- make sure nothing is mounted at /mnt/goddi/
- make sure to run with
sudo
Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with
sudo
.- username: Target user. Required parameter.
- password: Target user's password. Required parameter.
- domain: Full domain name. Required parameter.
- dc: DC to target. Can be either an IP or full hostname. Required parameter.
- startTLS: Use to StartTLS over 389.
- unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...
Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
- Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
- Users in priveleged user groups (DA, EA, FA).
- Users with passwords not set to expire.
- User accounts that have been locked or disabled.
- Machine accounts with passwords older than 45 days.
- Domain Computers.
- Domain Controllers.
- Sites and Subnets.
- SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
- Trusted domain relationships.
- Domain Groups.
- Domain OUs.
- Domain Account Policy.
- Domain deligation users.
- Domain GPOs.
- Domain FSMO roles.
- LAPS passwords.
- GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.
- Hacking Tools Free Download
- Computer Hacker
- Hack Tool Apk No Root
- Best Hacking Tools 2019
- Hacking Tools Kit
- Hacking Tools Github
- Hacking Tools For Beginners
- Hacking App
- Nsa Hack Tools Download
- Pentest Tools Linux
- Hacking Tools Software
- Hacker Tools 2020
- Pentest Tools Review
- What Is Hacking Tools
- Nsa Hack Tools
- Pentest Tools Free
- Hacker Tools Linux
- Pentest Tools Online
- Hacking Tools For Pc
- Black Hat Hacker Tools
- Hack And Tools
- Hacking Tools Free Download
- Tools For Hacker
- Hack And Tools
- Underground Hacker Sites
- Hacking Tools Kit
- Hacker Tools 2019
- Top Pentest Tools
- Pentest Tools List
- Tools For Hacker
- Hack Rom Tools
- Bluetooth Hacking Tools Kali
- Black Hat Hacker Tools
- Pentest Tools Review
- Hacker Tools List
- Hack Tools
- Hacker Tools Free Download
- Wifi Hacker Tools For Windows
- Hackrf Tools
- Hacker Tools Hardware
- Pentest Tools Open Source
- Pentest Tools For Ubuntu
- Hacking Tools Software
- Hacking Tools
- Hacking Tools For Windows Free Download
- Best Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Hack Tools For Windows
- Hack Website Online Tool
- Hacker Tools
- Hacking Tools For Games
- Pentest Tools Free
- Pentest Tools Tcp Port Scanner
- Android Hack Tools Github
- Growth Hacker Tools
- Hacking Tools Pc
- Hacking Tools For Kali Linux
- Termux Hacking Tools 2019
- Hacker Search Tools
- Hacking Tools Name
- Pentest Tools Windows
- Pentest Tools List
- Hacker Tools 2019
- Hacking App
- Hacker Tool Kit
- Hacker Tools Apk
- Hack Tools
- Hacking Tools For Windows
- Pentest Tools Nmap
- Hacking Tools For Games
- Hack Tool Apk No Root
- Hack Tools Pc
- Hacking Tools For Windows 7
- Pentest Automation Tools
- Pentest Tools Website
- Hack Tools Mac
- Pentest Automation Tools
- Hacking Apps
- Pentest Tools Tcp Port Scanner
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Pc
- Nsa Hacker Tools
- Hacker Tools
- Hacker Search Tools
- Hacking Tools Software
- Hacking Tools For Beginners
- Hacking Tools Name
- Hacker Tools
- Hacker Tools For Ios
- Hacking Tools For Mac
- Hacker Tools Apk
- Pentest Tools Review
- Pentest Tools Url Fuzzer
- Hackrf Tools
- Hacker
- Best Pentesting Tools 2018
- New Hacker Tools
- Hack Tools
- Hacker Tools Mac
- How To Hack
- Pentest Tools Subdomain
- Pentest Tools Port Scanner
- Hacker Tool Kit
- Hacking Tools Github
- Hack Website Online Tool
- Hacker Tools Github
- Pentest Tools Github
- Hack Tool Apk No Root
- Pentest Tools Github
- Hack Tools
- Pentest Tools Nmap
- Install Pentest Tools Ubuntu
- Hack Tools
- Hacker Tools Github
- Hack Website Online Tool
- Hacking Tools For Mac
- Pentest Tools Linux
- Hacking Tools For Beginners
Inga kommentarer:
Skicka en kommentar