./net/py-ldapdomaindump, Collection of Python classes for working with network protocols

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 0.9.3, Package name: py37-ldapdomaindump-0.9.3, Maintainer: pkgsrc-users

In an Active Directory domain, a lot of interesting information can be
retrieved via LDAP by any authenticated user (or machine). This makes
LDAP an interesting protocol for gathering information in the recon
phase of a pentest of an internal network. A problem is that data from
LDAP often is not available in an easy to read format.

ldapdomaindump is a tool which aims to solve this problem, by
collecting and parsing information available via LDAP and outputting
it in a human readable HTML format, as well as machine readable json
and csv/tsv/greppable files.

The tool was designed with the following goals in mind:
- Easy overview of all users/groups/computers/policies in the domain
- Authentication both via username and password, as with NTLM hashes
(requires ldap3 >=1.3.1)
- Possibility to run the tool with an existing authenticated
connection to an LDAP service, allowing for integration with
relaying tools such as impackets ntlmrelayx

The tool outputs several files containing an overview of objects in
the domain:
- domain_groups: List of groups in the domain
- domain_users: List of users in the domain
- domain_computers: List of computer accounts in the domain
- domain_policy: Domain policy such as password requirements and
lockout policy
- domain_trusts: Incoming and outgoing domain trusts, and their
properties

As well as two grouped files:
- domain_users_by_group: Domain users per group they are member of
- domain_computers_by_os: Domain computers sorted by Operating System


Required to run:
[net/py-dns] [devel/py-setuptools] [devel/py-future] [databases/py-ldap3] [lang/python37]

Required to build:
[pkgtools/cwrappers]

Master sites:

SHA1: 54adc858ed586c597787db6f6bc2954660b0d062
RMD160: 0b081b70493fc04eb54a96d95a66e6ad1a0f32c8
Filesize: 18.306 KB

Version history: (Expand)


CVS history: (Expand)


   2020-06-18 19:02:45 by Adam Ciarcinski | Files touched by this commit (4) | Package updated
Log message:
py-ldapdomaindump: updated to 0.9.3

0.9.3:
Unknown changes
   2020-05-27 00:44:16 by Adam Ciarcinski | Files touched by this commit (1)
Log message:
py-ldapdomaindump: add ALTERNATIVES
   2020-05-19 14:39:04 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
py-ldapdomaindump: updated to 0.9.2

0.9.2:
Unknown changes
   2020-05-18 10:45:34 by Leonardo Taccari | Files touched by this commit (1)
Log message:
py-ldapdomaindump: Sort PLIST
   2020-04-30 14:19:36 by Nikita | Files touched by this commit (1)
Log message:
py-ldapdomaindump: fix DEPENDS for py-dns
   2020-04-30 14:11:10 by Nikita | Files touched by this commit (1)
Log message:
py-ldapdomaindump: bump, use py-dns
   2020-04-30 13:48:42 by Nikita | Files touched by this commit (4)
Log message:
Add net/py-ldapdomaindump Version 0.9.1

In an Active Directory domain, a lot of interesting information can be
retrieved via LDAP by any authenticated user (or machine). This makes
LDAP an interesting protocol for gathering information in the recon
phase of a pentest of an internal network. A problem is that data from
LDAP often is not available in an easy to read format.

ldapdomaindump is a tool which aims to solve this problem, by
collecting and parsing information available via LDAP and outputting
it in a human readable HTML format, as well as machine readable json
and csv/tsv/greppable files.

The tool was designed with the following goals in mind:
- Easy overview of all users/groups/computers/policies in the domain
- Authentication both via username and password, as with NTLM hashes
  (requires ldap3 >=1.3.1)
- Possibility to run the tool with an existing authenticated
  connection to an LDAP service, allowing for integration with
  relaying tools such as impackets ntlmrelayx

The tool outputs several files containing an overview of objects in
the domain:
- domain_groups: List of groups in the domain
- domain_users: List of users in the domain
- domain_computers: List of computer accounts in the domain
- domain_policy: Domain policy such as password requirements and
  lockout policy
- domain_trusts: Incoming and outgoing domain trusts, and their
  properties

As well as two grouped files:
- domain_users_by_group: Domain users per group they are member of
- domain_computers_by_os: Domain computers sorted by Operating System