byt3bl33d3r / CrackMapExec

A swiss army knife for pentesting networks
BSD 2-Clause "Simplified" License
8.29k stars 1.64k forks source link

Added new module pso #781

Closed wanetty closed 1 year ago

wanetty commented 1 year ago

A module to query the PSO from LDAP.

crackmapexec ldap 192.168.0.5 -u 'user' -p 'pass' -M pso SMB 192.168.0.5 445 C15-DC-01 [*] Windows Server 2012 R2 Standard 9600 x64 (name:DC-01) (domain:domain.example.es) (signing:True) (SMBv1:True) LDAP 192.168.0.5 389 DC-01 [+] domain.example.es\user:XXXXXXXX PSO 192.168.0.5 389 DC-01 [+] Password Settings Objects (PSO) found: PSO 192.168.0.5 389 DC-01 cn: Users PSO 192.168.0.5 389 DC-01 msDS-PasswordReversibleEncryptionEnabled: FALSE PSO 192.168.0.5 389 DC-01 msDS-PasswordSettingsPrecedence: 50 PSO 192.168.0.5 389 DC-01 msDS-MinimumPasswordLength: 6 PSO 192.168.0.5 389 DC-01 msDS-PasswordHistoryLength: 6 PSO 192.168.0.5 389 DC-01 msDS-PasswordComplexityEnabled: FALSE PSO 192.168.0.5 389 DC-01 msDS-LockoutObservationWindow: 30 mins PSO 192.168.0.5 389 DC-01 msDS-LockoutDuration: 30 mins PSO 192.168.0.5 389 DC-01 msDS-LockoutThreshold: 6 PSO 192.168.0.5 389 DC-01 msDS-MinimumPasswordAge: 1 days PSO 192.168.0.5 389 DC-01 msDS-MaximumPasswordAge: 180 days PSO 192.168.0.5 389 DC-01 msDS-PSOAppliesTo: CN=USERS,DC=domain,DC=example,DC=es

mpgn commented 1 year ago

Hello @wanetty can you submit to PR to the new repo https://github.com/mpgn/CrackMapExec ?

fplazar commented 1 year ago

Hey @mpgn, as requested, the PR was submitted to the new repo.

You can find it in https://github.com/mpgn/CrackMapExec/pull/3

Thank you!