Closed wanetty closed 1 year ago
Hello @wanetty can you submit to PR to the new repo https://github.com/mpgn/CrackMapExec ?
Hey @mpgn, as requested, the PR was submitted to the new repo.
You can find it in https://github.com/mpgn/CrackMapExec/pull/3
Thank you!
A module to query the PSO from LDAP.
crackmapexec ldap 192.168.0.5 -u 'user' -p 'pass' -M pso SMB 192.168.0.5 445 C15-DC-01 [*] Windows Server 2012 R2 Standard 9600 x64 (name:DC-01) (domain:domain.example.es) (signing:True) (SMBv1:True) LDAP 192.168.0.5 389 DC-01 [+] domain.example.es\user:XXXXXXXX PSO 192.168.0.5 389 DC-01 [+] Password Settings Objects (PSO) found: PSO 192.168.0.5 389 DC-01 cn: Users PSO 192.168.0.5 389 DC-01 msDS-PasswordReversibleEncryptionEnabled: FALSE PSO 192.168.0.5 389 DC-01 msDS-PasswordSettingsPrecedence: 50 PSO 192.168.0.5 389 DC-01 msDS-MinimumPasswordLength: 6 PSO 192.168.0.5 389 DC-01 msDS-PasswordHistoryLength: 6 PSO 192.168.0.5 389 DC-01 msDS-PasswordComplexityEnabled: FALSE PSO 192.168.0.5 389 DC-01 msDS-LockoutObservationWindow: 30 mins PSO 192.168.0.5 389 DC-01 msDS-LockoutDuration: 30 mins PSO 192.168.0.5 389 DC-01 msDS-LockoutThreshold: 6 PSO 192.168.0.5 389 DC-01 msDS-MinimumPasswordAge: 1 days PSO 192.168.0.5 389 DC-01 msDS-MaximumPasswordAge: 180 days PSO 192.168.0.5 389 DC-01 msDS-PSOAppliesTo: CN=USERS,DC=domain,DC=example,DC=es