Skip to main content

ldapsearch tool to find vulnerable configuration in Active Directory

Project description

ldapsearch-ad.py

Python version Code style: black Code linter: flake8

GitHub Repo stars GitHub Repo forks

PyPI version PyPI format PyPI license

Python3 script to quickly get various information from a domain controller through its LDAP service.

I'm used to launch it as soon as I get valid AD credentials, while BloodHound and PingCastle are processing.

Requirements

  • Python version 3.6 or above is required to use f-Strings.
  • ldap3: to connect to the ldap service of target domain controller
  • pycryptodome: to connect using hash instead of password

Installation

With pipx:

pipx install git+https://github.com/yaap7/ldapsearch-ad

Simply get the source code and install the requirements:

git clone https://github.com/yaap7/ldapsearch-ad.git
cd ldapsearch-ad
pip install -r ./requirements.txt

Quick RTFM

Basically, if you do not have valid credentials yet, you can only use:

ldapsearch-ad.py -l 192.168.56.20 -t info

And once you get valid credentials, you will want to use -all with the logging option to get back to results later:

ldapsearch-ad.py -l 192.168.56.20 -d evilcorp -u jjohnny -p 'P@$$word' -o evilcorp_discover_all.log -t all

Thanks to Like0x from P1-Team, it is now possible to use it even with the hash:

./ldapsearch-ad.py -l 192.168.56.20 -d evilcorp -u jjohnny -hashes :32ed87bdb5fdc5e9cba88547376818d4 -t show-admins

More examples can be found in USAGE.md.

TODO

  • Adapt the package so it could be used independently (in CLI or as a package to import)
  • look for new vulnerable configuration to add: https://youtu.be/7_iv_eaAFyQ

Done:

  • publish ldapsearchad as a package on PyPI.
  • create a python package to help other projects to import the functions and use the main class.
  • implement ldap3 pagging functionality: available since v2022.08.18
  • verify all the -t options are shown in USAGE.md and explain most complicated options : kerberoast, search-spn, asreproast, goldenticket, search-delegation, createsid.
  • give useful search examples (see https://phonexicum.github.io/infosec/windows.html and https://blog.xpnsec.com/kerberos-attacks-part-2/)
  • add a command to get vulnerable users to AS-REP-roasting (thanks @HadrienPerrineau)
  • change the core architecture to create an object and do not open multiple connection for -t all
  • search for ForeignSecurityPrincipals (When a user/group from an external domain/forest are added to a group in a domain, an object of type foreignSecurityPrincipal is created at CN=<user_SID>,CN=ForeignSecurityPrincipals,DC=domain,DC=com)

Contributions

Feel free to fork, adapt, modify, contribute, and do not hesitate to send a pull request so the tool could be improved for everyone.

I would even make you a collaborator if you want so you could contribute directly on this repo!

Contributors

  • CSbyGB for typos corrections
  • Like0x from P1-Team for the connection using NTLM hash instead of password, and the createsid feature.
  • nsilver7 for the option to append the output in a file in addition to the standard output.
  • d34dl0ckk for adding the -n option to request data from the Global Catalog, and the -t search-foreign-security-principals feature.
  • Adamkadaban for improving the OpSec of the tool by getting sensitive information (login, password, hash) from files instead in the CLI directly, and by adding setup.py to allow easy installation through pipx! 🎊
  • DrorDvash for reporting a bug in -t goldenticket.

Credits

Obviously, all credits goes to people who discover the technics and vulnerabilities. This tool is only an humble attempt to implement their technics using python3 to understand how things work and because I like to play with the LDAP interface of Active Directory. Unfortunately, I heard the ldap interface could be removed from domain controllers in the future :(

Thanks to Bengui for the username convention.

Similar projects

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ldapsearchad-2024.12.10.tar.gz (55.2 kB view details)

Uploaded Source

Built Distribution

ldapsearchad-2024.12.10-py3-none-any.whl (42.1 kB view details)

Uploaded Python 3

File details

Details for the file ldapsearchad-2024.12.10.tar.gz.

File metadata

  • Download URL: ldapsearchad-2024.12.10.tar.gz
  • Upload date:
  • Size: 55.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.3

File hashes

Hashes for ldapsearchad-2024.12.10.tar.gz
Algorithm Hash digest
SHA256 93a39eed6bdc87ce31e33ae52e4ba98b8973425fca019632ff6019e9055fa8a5
MD5 24ed883daf6fd2cdfaca2eefa6cb14bb
BLAKE2b-256 f0f2c2c0e73411e59a708263b1cd2aaac1dfadb6c2c0c6bb7e962ebac341851f

See more details on using hashes here.

File details

Details for the file ldapsearchad-2024.12.10-py3-none-any.whl.

File metadata

File hashes

Hashes for ldapsearchad-2024.12.10-py3-none-any.whl
Algorithm Hash digest
SHA256 ff704180e5cc01462624e43bd054a04e175051ffeef8f504097f2100f1a8a808
MD5 e1f66dec3934a7557fa449f4d2f310cf
BLAKE2b-256 7370f389d9e7a1f7df76707c76ae2103810bc9dabd892278de507151c1a3b120

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page