Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.
Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2
Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).
Linux
Tested on Kali Linux (go1.10 linux/amd64).
- umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
- make sure nothing is mounted at /mnt/goddi/
- make sure to run with
sudo
Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with
sudo
.- username: Target user. Required parameter.
- password: Target user's password. Required parameter.
- domain: Full domain name. Required parameter.
- dc: DC to target. Can be either an IP or full hostname. Required parameter.
- startTLS: Use to StartTLS over 389.
- unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...
Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
- Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
- Users in priveleged user groups (DA, EA, FA).
- Users with passwords not set to expire.
- User accounts that have been locked or disabled.
- Machine accounts with passwords older than 45 days.
- Domain Computers.
- Domain Controllers.
- Sites and Subnets.
- SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
- Trusted domain relationships.
- Domain Groups.
- Domain OUs.
- Domain Account Policy.
- Domain deligation users.
- Domain GPOs.
- Domain FSMO roles.
- LAPS passwords.
- GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.
- Hack Apps
- Hacking App
- Hacking Tools For Beginners
- Hacking Tools For Windows
- Android Hack Tools Github
- Game Hacking
- Pentest Tools Online
- Pentest Tools List
- Hacker Tools For Mac
- Hack Tools Download
- Pentest Tools Website Vulnerability
- Pentest Tools Open Source
- Termux Hacking Tools 2019
- Pentest Tools Subdomain
- Best Hacking Tools 2020
- Pentest Tools Url Fuzzer
- Hack Tools For Ubuntu
- Hacking Tools For Mac
- Hacker Tools Github
- Hacking Tools Github
- Pentest Tools Github
- Pentest Tools Nmap
- Hacker Tools For Ios
- Hacking Tools Github
- Pentest Tools Subdomain
- Pentest Tools Linux
- Pentest Automation Tools
- World No 1 Hacker Software
- Pentest Tools
- Pentest Tools For Android
- Hack Rom Tools
- Hack App
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Hacker Tools
- Hacking Tools For Windows
- Hacking Tools Download
- Hacker Search Tools
- Hack Tool Apk
- Hacking Tools For Pc
- Beginner Hacker Tools
- Pentest Tools For Android
- Hacker Tools List
- Pentest Tools Framework
- Hacking Apps
- Pentest Tools Subdomain
- Pentest Tools Download
- Hacker Tools 2019
- Hacker Tools List
- Hacker Tools Software
- Hacker Tools Apk Download
- Pentest Tools Port Scanner
- Usb Pentest Tools
- Hack Tool Apk
- Underground Hacker Sites
- Hacker Tool Kit
- Hack Apps
- Hackrf Tools
- Underground Hacker Sites
- Kik Hack Tools
- Hacking Tools 2019
- Hacking Tools For Beginners
- Pentest Tools Nmap
- Pentest Tools For Android
- Pentest Tools For Mac
- Pentest Tools Subdomain
- Hack Tools For Ubuntu
- Pentest Tools Kali Linux
- Hacking Tools For Kali Linux
- Computer Hacker
- Pentest Tools Website
- Hack Tools Pc
- Hack Tools For Windows
- Hack Tools For Games
- Nsa Hack Tools
- Hacking Tools Free Download
- Pentest Tools Download
- Pentest Recon Tools
- Hack Tools Download
- Hack Tools Download
- Hacker Tools For Ios
- Pentest Tools For Ubuntu
- Hack Tools
- Pentest Tools Website Vulnerability
- Wifi Hacker Tools For Windows
- World No 1 Hacker Software
- Hack Tools Pc
- Hacking Tools Download
- Pentest Tools Nmap
- Hacking Tools For Pc
- Pentest Tools Online
- Hacking Tools For Pc
- Hacker Tools Hardware
- What Is Hacking Tools
- Hacker Tools Apk
- Hacking Tools For Pc
- Pentest Tools Review
- Hack Tool Apk No Root
- Pentest Tools For Android
- Hack Rom Tools
- Best Hacking Tools 2020
- Android Hack Tools Github
- Hacker Tools List
- Hack Tool Apk No Root
- How To Hack
- Hacking Tools Download
- Pentest Tools Kali Linux