Skip to main content

Fast offline auditing of Active Directory passwords using Python and multiprocessing

Project description

Lil Pwny

Python 2.7 and 3 compatible PyPI version License: MIT

Fast offline auditing of Active Directory passwords using Python.

About Lil Pwny

Lil Pwny is a Python application to perform an offline audit of NTLM hashes of users' passwords, recovered from Active Directory, against known compromised passwords from Have I Been Pwned. Results will be output in JSON format containing the username, matching hash (can be obfuscated), and how many times the matching password has been seen in HIBP

More information about Lil Pwny can be found on my blog

Features

  • Custom Password Auditing: Ability to provide a list of your own custom passwords to check AD users against. This allows you to check user passwords against passwords relevant to your organisation that you suspect people might be using.
    • Pass a .txt file with the plaintext passwords you want to search for, these are then NTLM hashed and AD hashes are then compared with this as well as the HIBP hashes.
  • Detect Duplicates: Return a list of accounts using the same passwords. Useful for finding users using the same password for their administrative and standard accounts.
  • Username as Password: Detect users that are using their username, or variations of it, as their password.
  • Obfuscated Output: Obfuscate hashes in output, for if you don't want to handle or store live user NTLM hashes.

Custom Password List Enhancement

Lil Pwny provides the functionality to enhance your custom password list by adding commonly used variants of your custom passwords. These include:

  • Passwords with common 'leetspeak' substitutions (e.g. P@ssw0rd)
  • Uppercase versions of the password, and uppercase first characters (e.g. PASSWORD, Password)
  • Passwords with common special characters appended or prepended (e.g. password!, !password)
  • Passwords padded with common alphanumeric characters, special characters and repetitions of themselves to make them meet a given minimum length (e.g. password123!, !passwordabc, passwordpassword)
    • You pass your desired minimum password length to Lil Pwny when selecting the custom list enhancement option
  • Passwords with dates appended starting from the year 1950 up to 10 years from today's date (e.g. password1950, password2034)

A custom password list of 100 plaintext passwords generates 49848660 variations.

Usernames in Passwords

Lil Pwny looks for users that are using variations of their username as their password.

It converts the users username into the following formats:

  • All uppercase
  • All lowercase
  • Remove dot "."
  • camelCase (E.g. johnSmith)
  • PascalCase (E.g. JohnSmith)

These are then converted to NTLM hashes, and audited against the AD hashes

Resources

This application has been developed to make the most of multiprocessing in Python, with the aim of it working as fast as possible on consumer level hardware.

Because it uses multiprocessing, the more cores you have available, the faster Lil Pwny should run. I have still had very good results with a low number of logical cores:

  • Test env of ~8500 AD accounts and HIBP list of 613,584,246 hashes:
    • 6 logical cores - 0:05:57.640813
    • 12 logical cores - 0:04:28.579201

Output

Lil Pwny will output results as either to stdout:

or JSON:

{"localtime": "2021-00-00 00:00:00,000", "level": "NOTIFY", "source": "Lil Pwny", "match_type": "hibp", "detection_data": {"username": "RICKON.STARK", "hash": "32ED87BDB5FDC5E9CBA88547376818D4", "matches_in_hibp": "24230577", "obfuscated": "True"}}

You can redirect the JSON output of Lil Pwny to file:

lil-pwny -ad ... > lil-pwny-results.json 

This JSON formatted logging can be easily ingested in to a SIEM or other log analysis tool, and can be fed to other scripts or platforms for automated resolution actions.

Installation

Install via pip

pip install lil-pwny

Usage

Lil-pwny will be installed as a global command, use as follows:

usage: lil-pwny [-h] -hibp HIBP [-v] [-c CUSTOM] [-custom-enhance CUSTOM_ENHANCE] -ad AD_HASHES [-d] [-output {file,stdout,json}] [-o] [--verbose]

Fast offline auditing of Active Directory passwords using Python

options:
  -h, --help            show this help message and exit
  -hibp HIBP, --hibp HIBP
                        The .txt file containing HIBP NTLM hashes
  -v, --version         show program's version number and exit
  -c CUSTOM, --custom CUSTOM
                        .txt file containing additional custom passwords to check for
  -custom-enhance CUSTOM_ENHANCE, --custom-enhance CUSTOM_ENHANCE
                        generate an enhanced custom password list based on the provided custom password list. Must be used with -c/--custom flag. The enhanced list will stored in memory and not
                        written to disk. Provide the minimum length of the passwords you want. Default is 8
  -ad AD_HASHES, --ad-hashes AD_HASHES
                        The .txt file containing NTLM hashes from AD users
  -d, --duplicates      Output a list of duplicate password users
  -output {file,stdout,json}, --output {file,stdout,json}
                        Where to send results
  -o, --obfuscate       Obfuscate hashes from discovered matches by hashing with a random salt
  --verbose             Turn on verbose logging

Example:

lil-pwny -hibp ~/hibp_hashes.txt -ad ~/ad_user_hashes.txt -c ~/custom_passwords.txt -output stdout -do

Getting input files

Step 1: Get an IFM AD database dump

On a domain controller use ntdsutil to generate an IFM dump of your AD domain. Run the following in an elevated PowerShell window:

ntdsutil
activate instance ntds
ifm
create full **output path**

Step 2: Recover NTLM hashes from this output

To recover the NTLM hashes from the AD IFM data, the Powershell module DSInternals is required.

Once installed, use the SYSTEM hive in the IFM data to recover the hashes in the format usernme:hash and save them to the file ad_ntlm_hashes.txt

$bootKey = Get-BootKey -SystemHivePath '.\registry\SYSTEM'
Get-ADDBAccount -All -DBPath '.\Active Directory\ntds.dit' -BootKey $bootKey | Format-Custom -View HashcatNT | Out-File ad_ntlm_hashes.txt -Encoding ASCII

Step 3: Download the latest HIBP hash file

The file can be downloaded from the HIBP API using a .net utility here

Optional Step: Filter unwanted AD accounts

The PowerShell script in the scripts directory can be used to remove unwanted accounts from the IFM output before processing. These include:

  • Disabled accounts
  • Computer accounts

Resources

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

lil_pwny-3.2.0.tar.gz (30.7 kB view details)

Uploaded Source

Built Distribution

lil_pwny-3.2.0-py3-none-any.whl (31.1 kB view details)

Uploaded Python 3

File details

Details for the file lil_pwny-3.2.0.tar.gz.

File metadata

  • Download URL: lil_pwny-3.2.0.tar.gz
  • Upload date:
  • Size: 30.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.12.4 Linux/6.5.0-1025-azure

File hashes

Hashes for lil_pwny-3.2.0.tar.gz
Algorithm Hash digest
SHA256 17449497a6013c6cfb5a71b3707c0d536490f8ace930f84d101a38d339609faa
MD5 bb077888f55ddb1329e7c113ec65db56
BLAKE2b-256 5190046ac816e04e463e487817f8cfd03126d98a393a2a10edb84efc97f315c2

See more details on using hashes here.

File details

Details for the file lil_pwny-3.2.0-py3-none-any.whl.

File metadata

  • Download URL: lil_pwny-3.2.0-py3-none-any.whl
  • Upload date:
  • Size: 31.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.12.4 Linux/6.5.0-1025-azure

File hashes

Hashes for lil_pwny-3.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 43e09187fe8fed23343d40b332a9eaf781437ab0540d3f1969b5de475ff8e082
MD5 23b3ee4b33a79e09447f52c42711d1ca
BLAKE2b-256 45c3a31fb8188fd26f67ae6133e0a4fd8d4ed929428355049773262d8db471f1

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page