Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.
Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2
Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).
Linux
Tested on Kali Linux (go1.10 linux/amd64).
- umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
- make sure nothing is mounted at /mnt/goddi/
- make sure to run with
sudo
Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with
sudo
.- username: Target user. Required parameter.
- password: Target user's password. Required parameter.
- domain: Full domain name. Required parameter.
- dc: DC to target. Can be either an IP or full hostname. Required parameter.
- startTLS: Use to StartTLS over 389.
- unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...
Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
- Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
- Users in priveleged user groups (DA, EA, FA).
- Users with passwords not set to expire.
- User accounts that have been locked or disabled.
- Machine accounts with passwords older than 45 days.
- Domain Computers.
- Domain Controllers.
- Sites and Subnets.
- SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
- Trusted domain relationships.
- Domain Groups.
- Domain OUs.
- Domain Account Policy.
- Domain deligation users.
- Domain GPOs.
- Domain FSMO roles.
- LAPS passwords.
- GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.
Related links
- Pentest Tools Alternative
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Review
- Hack Apps
- Hacks And Tools
- Pentest Tools Windows
- How To Hack
- Pentest Tools Linux
- Hack Tools Pc
- Pentest Tools Bluekeep
- Hacking Tools Windows
- Hacking Tools For Kali Linux
- Pentest Tools Website Vulnerability
- Pentest Recon Tools
- Tools 4 Hack
- Black Hat Hacker Tools
- Hacking Tools For Windows
- How To Make Hacking Tools
- Pentest Tools Windows
- Hacker
- Best Pentesting Tools 2018
- Hack Tools For Pc
- Hack App
- Hacker Tools Online
- Hack Tool Apk
- Underground Hacker Sites
- Wifi Hacker Tools For Windows
- Pentest Tools Open Source
- Hacker Tools Github
- Pentest Tools Website Vulnerability
- Hack Tools For Mac
- Hackrf Tools
- Pentest Tools Kali Linux
- How To Install Pentest Tools In Ubuntu
- Game Hacking
- Hacking Tools For Pc
- Usb Pentest Tools
- Pentest Tools Linux
- Hacking Tools For Games
- Hack Tools For Ubuntu
- Tools For Hacker
- Hacker
- Hack Apps
- Pentest Tools Tcp Port Scanner
- Pentest Tools Subdomain
- Nsa Hack Tools
- Hacking Tools For Beginners
- Hacking Tools For Beginners
- Hacker Tools Github
- Tools For Hacker
- Nsa Hack Tools Download
- Hacker Tools Hardware
- Easy Hack Tools
- Pentest Tools Tcp Port Scanner
- Hacker Tools Online
- Hacker Tools For Mac
- Hack Tools For Games
- Hacking Tools For Mac
- Hacker Tools Mac
- Pentest Tools Bluekeep
- Pentest Tools Port Scanner
- Pentest Tools Find Subdomains
- Hack Tools For Ubuntu
- Hacking Tools For Games
- Pentest Tools List
- Hacking Tools For Pc
- Hack Apps
- Hack Tools
- Hacking Tools For Pc
- Growth Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools For Mac
- Pentest Tools Windows
- Hacker Techniques Tools And Incident Handling
- Hacking Apps
- Hackrf Tools
- Hack Tools For Games
- Hacker Tools For Pc
- Tools For Hacker
- Hacking Tools 2020
- Github Hacking Tools
- Computer Hacker
- Hack Tools Pc
- Ethical Hacker Tools
- Hacker Tools For Pc
- Pentest Tools List
- Tools 4 Hack
- Hacking App
- Pentest Tools Url Fuzzer
- Hack Tools Download
- Game Hacking
- Computer Hacker
- Usb Pentest Tools
- Kik Hack Tools
- Hacking Tools For Windows 7
- Pentest Tools For Android
- Hack Tools For Windows
- Hacking Tools For Windows
- Hacker Tools Github
- Hacker Techniques Tools And Incident Handling
- Computer Hacker
- Best Hacking Tools 2020
- What Is Hacking Tools
- Kik Hack Tools
- Pentest Tools Open Source
- Hacker Tools For Windows
- Hack Tools 2019
- Beginner Hacker Tools
- Hacker Tools For Ios
- Hacking Tools For Windows Free Download
- Pentest Tools Apk
- Wifi Hacker Tools For Windows
- Hacking Tools
- Best Hacking Tools 2019
- Pentest Tools For Windows
- Hack Tools Download
No comments:
Post a Comment