Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.
Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).
Linux
Tested on Kali Linux (go1.10 linux/amd64).
- umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils- make sure nothing is mounted at /mnt/goddi/
- make sure to run with
sudo
Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with
sudo.- username: Target user. Required parameter.
- password: Target user's password. Required parameter.
- domain: Full domain name. Required parameter.
- dc: DC to target. Can be either an IP or full hostname. Required parameter.
- startTLS: Use to StartTLS over 389.
- unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
- Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
- Users in priveleged user groups (DA, EA, FA).
- Users with passwords not set to expire.
- User accounts that have been locked or disabled.
- Machine accounts with passwords older than 45 days.
- Domain Computers.
- Domain Controllers.
- Sites and Subnets.
- SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
- Trusted domain relationships.
- Domain Groups.
- Domain OUs.
- Domain Account Policy.
- Domain deligation users.
- Domain GPOs.
- Domain FSMO roles.
- LAPS passwords.
- GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.
- Hack Tools Download
- Pentest Tools Download
- Hacker Tools 2019
- Termux Hacking Tools 2019
- Kik Hack Tools
- Hack Rom Tools
- Hacker Tools Apk
- How To Hack
- How To Hack
- Hacker Tools Linux
- Hack Rom Tools
- Hacking App
- Hacker
- Pentest Tools Android
- Hack Tools For Pc
- How To Install Pentest Tools In Ubuntu
- Hack Website Online Tool
- Hack Tools Mac
- Hacking Tools Software
- Hack Tools For Pc
- Hacking Tools For Beginners
- World No 1 Hacker Software
- Pentest Tools Open Source
- Hacker Tools Mac
- Growth Hacker Tools
- Computer Hacker
- Hacking Tools Online
- Hacking Tools Download
- Hacker
- Hacking Tools For Pc
- Hack Tool Apk No Root
- How To Install Pentest Tools In Ubuntu
- Usb Pentest Tools
- Pentest Tools Find Subdomains
- Easy Hack Tools
- Hacker Security Tools
- Physical Pentest Tools
- World No 1 Hacker Software
- Hacker Tools List
- New Hack Tools
- Hacking Tools Name
- Hacking Tools For Windows 7
- Pentest Tools Apk
- Pentest Tools Find Subdomains
- Pentest Tools Free
- Hack Apps
- Hacking Tools Name
- Nsa Hacker Tools
- Free Pentest Tools For Windows
- Hack Tools For Mac
- Hack Tools
- Pentest Reporting Tools
- Hack Tools For Pc
- Termux Hacking Tools 2019
- Hack Tools Mac
- Hacker Tools For Ios
- Hacker Tools Software
- Pentest Tools Website Vulnerability
- Pentest Tools Open Source
- Underground Hacker Sites
- Hacking Apps
- Hack Tools
- Github Hacking Tools
- Pentest Tools For Ubuntu
- Hack And Tools
- Hacker Tools Free Download
- Pentest Recon Tools
- Hack Tool Apk
- Hacker Tools For Pc
- Pentest Tools For Ubuntu
- Pentest Tools Find Subdomains
- Pentest Tools Website Vulnerability
- Hacker Tools Linux
- Hack Website Online Tool
- Pentest Box Tools Download
- How To Make Hacking Tools
- Hacking Tools Windows 10
- Pentest Tools Android
- Hacking Tools For Windows 7
- Pentest Tools Nmap
- Pentest Tools Download
- Hackrf Tools
- Hacking Tools Software
- Hack Tools For Pc
- Computer Hacker
- Hack Tools Download
- Hacker Tools 2019
- Pentest Tools Bluekeep
- Pentest Tools
- Pentest Reporting Tools
- Computer Hacker
- Pentest Recon Tools
- Top Pentest Tools
- Hack Tools
- Hacking Tools For Mac
- Hacking Tools Software
- Hacking Tools Usb
- Pentest Tools Url Fuzzer
- How To Make Hacking Tools
- Easy Hack Tools
- Hacker Tools Windows
- Hacking Tools For Beginners
- Computer Hacker
- Hacker Tools Hardware
- Hacking Tools For Windows
- Pentest Tools Linux
- Pentest Tools List
- Free Pentest Tools For Windows
- World No 1 Hacker Software
- Hacking Tools Download
- Hacker Tools Free
- Hacking Tools For Games
- Hack Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hacking Tools
- Android Hack Tools Github

No comments:
Post a Comment