Skip to content

dvs17/AD-Scripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

hashcatmatch

script to match hashcat cracked file to the username of NTLM hashes file

python hashcatmatch.py [DC-Hashes file] [cracked file from hashcat]

lm-info

To check if users are stored in LM Hash format; use secretsdump to extract hashes

python lm-info.py [DC-Hashes.ntds from secretsdump]

Enumerating and Analyzing User Description from AD

I tend to use windapsearch.py, https://github.com/ropnop/windapsearch

Enumerating

python userdes.py [extracted dump with windapsearch] > user-description

Analyzing

python udeslyze.py [user-description] [company name i.e. microsoft]

Extracting user:group from Windapsearch.py output

python enumgroups.py allinfo

About

Some scripts I use during pentesting

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages