Find and notify users in your Active Directory with weak passwords
Project description
Crack-O-Matic
Find and notify users in your Active Directory with weak passwords.
Features:
- Linux-based
- Flask-based web app
- Hashcat or John cracker
- Automated e-mails
- Graphical reports
- Privacy preserving
Read the docs for more information.
Tests
If you're a developer and want to run the tests, you need to edit
tests/.env
and define the following variables according to your
environment:
JOHN_PATH
(path tojohn
binary)HASHCAT_PATH
(path tohashcat
binary)DOMAIN
(FQDN of a test domain)DOMAINUSER
(name of one of its domain admins)DOMAINPASS
(domain admin password)HOST
(FQDN of a domain controller in the test domain)
If you don't have a test domain, you can use the docker-compose file in
tests/docker
to run a Samba DC (docker-compose run --service-ports dc
).
Inside the file you will find the values you need. You should also create an
entry for the FQDN in your /etc/hosts
.
License and Copyright
MIT, Copyright 2021 Adrian Vollmer
See LICENSE for the full license text.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for Crack_O_Matic-0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | fae64d6703ffe9e1a865f2db12ce4012be35e1d6f906298c4849a8df5e667c7a |
|
MD5 | 719d5adf5058229c5324b81563397e3a |
|
BLAKE2b-256 | 987c2b25cb7732c590d7cb1132ef5092c04538f6f9c64443e3ab78a59b90a25b |