Skip to content

maver1ks/Coverage

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Domain Coverage Analysis Tool

Tool for analyzing domain security based on various data sources:

  • LDAP domain dump
  • NTDS.dit dump
  • Hashcat output

Installation

Using UV (Recommended)

uv venv
uv pip install -r requirements.txt
uv run main.py -h

Old method

pip install -r requirements.txt

Preparation

To run the script, you need to have the output of ldapdomaindump, secretsdump and the result of a brute-force attack on the obtained *.ntds file

mkdir ldapdomaindump && cd ldapdomaindump
ldapdomaindump -u vulnad.local\\Administrator -p "1qaz@WSX" 10.10.10.10

cd .. && mkdir DUMP
secretsdump.py vulnad.local/Administrator:1qaz@WSX@10.10.10.10 -outputfile DUMP/DUMP

hashcat -m 1000 DUMP/DUMP.ntds -o DUMP/DUMP.ntds.out /usr/share/wordlists/rockyou.txt

Usage

usage: main.py [-h] [-l] [--ldd LDD] [--ntds NTDS] [--hashcat HASHCAT] [-o OUTPUT] [-m MODULES] [-v]

Domain Coverage Analysis Tool

options:
  -h, --help            show this help message and exit
  -l, --list-modules    List available modules
  --ldd LDD             Path to LDAP domain dump (JSON file, directory with JSON files, or ZIP archive)
  --ntds NTDS           Path to NTDS.dit dump
  --hashcat HASHCAT     Path to Hashcat output
  -o OUTPUT, --output OUTPUT
                        Path to output report file
  -m MODULES, --modules MODULES
                        Comma-separated list of modules to run (default: all)
  -v, --verbose         Enable verbose output
uv run main.py --ldd <path_to_ldap_dump> --ntds <path_to_ntds_dump> --hashcat <path_to_hashcat_output> --output <output_file>

List modules

uv run main.py -l
Available modules:
- reversible_encryption
- passwords_reuse
- weak_passwords
- passwords_in_description
- kerberoasting
- pre2k
- asreproasting
- unconstrained_delegation

Analysis using 3 modules:

uv run main.py --ldd ldapdomaindump --ntds DUMP --hashcat DUMP/DUMP.ntds.out -m passwords_reuse,weak_passwords,passwords_in_description
Parsing LDAP data...
Parsing NTDS data...
Parsing Hashcat output...
Loaded 3 modules
Running modules...
Building report to report.md...
Done!

Module Development

To create a new module:

  1. Create a new directory in modules/
  2. Create module.py implementing IModule interface
  3. Create template.md with Jinja2 template for report

Example module structure:

modules/my_module/
├── module.py
└── template.md

About

A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking results.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%