Skip to main content

Enumerate Active Directory with standard vectors

Project description

GitHub stars GitHub forks GitHub license FOSSA Status Total alerts Language grade: Python

Packaging status

ADE - ActiveDirectoryEnum

 python -m ade
usage: ade [-h] [--dc DC] [-o OUT_FILE] [-u USER] [-s] [-smb] [-kp] [-bh] [-spn] [-sysvol] [--all] [--no-creds] [--dry-run]
           [--exploit EXPLOIT]

        ___        __  _            ____  _                __                   ______                    
       /   | _____/ /_(_)   _____  / __ \(_)_______  _____/ /_____  _______  __/ ____/___  __  ______ ___ 
      / /| |/ ___/ __/ / | / / _ \/ / / / / ___/ _ \/ ___/ __/ __ \/ ___/ / / / __/ / __ \/ / / / __ `__ \
     / ___ / /__/ /_/ /| |/ /  __/ /_/ / / /  /  __/ /__/ /_/ /_/ / /  / /_/ / /___/ / / / /_/ / / / / / /
    /_/  |_\___/\__/_/ |___/\___/_____/_/_/   \___/\___/\__/\____/_/   \__, /_____/_/ /_/\__,_/_/ /_/ /_/ 
                                                                      /____/                             

/*----------------------------------------------------------------------------------------------------------*/

optional arguments:
  -h, --help            show this help message and exit
  --dc DC               Hostname of the Domain Controller
  -o OUT_FILE, --out-file OUT_FILE
                        Path to output file. If no path, CWD is assumed (default: None)
  -u USER, --user USER  Username of the domain user to query with. The username has to be domain name as `user@domain.org`
  -s, --secure          Try to estalish connection through LDAPS
  -smb, --smb           Force enumeration of SMB shares on all computer objects fetched
  -kp, --kerberos_preauth
                        Attempt to gather users that does not require Kerberos preauthentication
  -bh, --bloodhound     Output data in the format expected by BloodHound
  -spn                  Attempt to get all SPNs and perform Kerberoasting
  -sysvol               Search sysvol for GPOs with cpassword and decrypt it
  --all                 Run all checks
  --no-creds            Start without credentials
  --dry-run             Don't execute a test but run as if. Used for testing params etc.
  --exploit EXPLOIT     Show path to PoC exploit code

The new inclusion of imbedded exploits can yield results such as:

...
[ WARN ] DC may be vulnerable to: [ cve-2020-1472 ]
...

To query an exploit do for PoC code:

$ python -m ade --exploit cve-2020-1472
Exploit for: cve-2020-1472 can be found at: https://github.com/dirkjanm/CVE-2020-1472

Install

Run installation through pip3:

pip3 install ActiveDirectoryEnum
python -m ade

If you run BlackArch, ActiveDirectoryEnum is available through pacman as such:

pacman -S activedirectoryenum

Included attacks/vectors

  • ASREPRoasting
  • Kerberoasting
  • Dump AD as BloodHound JSON files
  • Searching GPOs in SYSVOL for cpassword and decrypting
  • Run without creds and attempt to gather for further enumeration during the run
  • Sample exploits included:
  • CVE-2020-1472

Collaboration

While this project is developed to fit my need, any collaboration is appriciated. Please feel free to fork the project, make changes according to the License agreements and make a Pull Request. I only ask that:

  • Keep equivilent naming standard as the base project
  • Keep equivilent syntaxing
  • Test your code
  • Error handling is incorporated
  • Document the feature - both in code but also for potential Wiki page

Thanks & Acknowledgements

Big thanks to the creators of: Impacket @github BloodHound @github BloodHound.py @github CVE-2020-1472 by Tom Tervoort of Secura

Without the above this wrapper was not possible.

License

FOSSA Status

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ActiveDirectoryEnum-0.5.0.tar.gz (17.1 kB view details)

Uploaded Source

Built Distribution

ActiveDirectoryEnum-0.5.0-py3-none-any.whl (88.0 kB view details)

Uploaded Python 3

File details

Details for the file ActiveDirectoryEnum-0.5.0.tar.gz.

File metadata

  • Download URL: ActiveDirectoryEnum-0.5.0.tar.gz
  • Upload date:
  • Size: 17.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/41.6.0 requests-toolbelt/0.9.1 tqdm/4.49.0 CPython/3.8.5

File hashes

Hashes for ActiveDirectoryEnum-0.5.0.tar.gz
Algorithm Hash digest
SHA256 9041a63a17e7e7ba835667ce041bdf5ce27c6c308fc8e7bda9eb3ea1a77b0ed4
MD5 83bf795926e0b6d8d669b19d7ee9df61
BLAKE2b-256 c46f749bde7149555df102d7d14d3722d65cd445de8705c8e01080ba28a3e713

See more details on using hashes here.

File details

Details for the file ActiveDirectoryEnum-0.5.0-py3-none-any.whl.

File metadata

  • Download URL: ActiveDirectoryEnum-0.5.0-py3-none-any.whl
  • Upload date:
  • Size: 88.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/41.6.0 requests-toolbelt/0.9.1 tqdm/4.49.0 CPython/3.8.5

File hashes

Hashes for ActiveDirectoryEnum-0.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 2cd2d0a87a729674f4f776e16470b884d01475b07d3bceec6f44a16ba11fd39b
MD5 99c95317ce1b3736313c387b6e8edc44
BLAKE2b-256 45d98a54b67563d9374c855adf954017d3f0cd48494ad997626732dd1ec27114

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page