April 6, 2020
  • 5:30 pm Kaboom – Automatic Pentest Bash Script
  • 8:26 pm Archery – A Security Tool
  • 2:51 pm Commix – Automated All-in-One OS command injection and exploitation tool
  • 12:28 pm RouterSploit – Exploitation Framework for Embedded Devices
  • 12:23 pm Dunkin Donuts Hacked & User Information Stolen

LDAP_Search can be used to to enumerate Users, Groups, and Computers on a Windows Domain. In addition, this tool can brute force/password-spraying valid accounts via LDAP. It makes use of Impackets python36 branch (still in dev) to perform its main operations and allows authentication via traditional passwords or hashes.

Note: ldap_search, although functional, is more of a PoC. Stay tuned for updates in functionality and formatting.


git clone –recursive https://github.com/m8r0wn/ldap_search
cd ldap_search
sudo chmod +x setup.sh
sudo ./setup.sh

How to Use:
Enumerate all active users on a domain:

python3 ldap_search.py users -u user1 -p Password1 -d demo.local
Lookup a single user:
python3 ldap_search.py users -q AdminUser -u user1 -p Password1 -d demo.local
Enumerate all computers on a domain:
python3 ldap_search.py computers -u user1 -p Password1 -d demo.local
Enumerate all groups on the domain:
python3 ldap_search.py groups -u user1 -p Password1 -d demo.local
Query group members:
python3 ldap_search.py groups -q “Domain Admins” -u user1 -p Password1 -d demo.local

Download: https://github.com/m8r0wn/ldap_search