Cyber security

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs).

It automates security checks and provides detailed reports on potential vulnerabilities, helping administrators secure their environments.

Features

  • Connects to Active Directory using LDAP/LDAPS protocols.
  • Supports NTLM authentication and Pass-the-Hash techniques.
  • Analyzes all GPOs within the domain.
  • Identifies and reports security misconfigurations.
  • Displays affected organizational units (OUs) and objects.
  • Offers multiple output formats: JSON, CSV, and HTML.
  • Provides an option to view detailed XML content of GPO files.

Security Checks

Currently, GPOHunter implements the following security checks:

  1. Clear Text Password Storage
    • Detects the “ClearTextPassword = 1” setting in GPOs.
    • This setting allows passwords to be stored in unencrypted form, posing a critical security risk by exposing credentials.
  2. GPP Passwords (MS14-025)
    • Identifies encrypted passwords within Group Policy Preferences.
    • Examines various GPP files such as Groups.xml, Services.xml, and others.
    • These passwords are encrypted with a known key and can be easily decrypted using public information.
  3. NetNTLMv1 Authentication Enabled
    • Detects insecure LmCompatibilityLevel settings.
    • Identifies GPOs that enable NetNTLMv1, which is vulnerable to:
      • Relay attacks when combined with Coerce.
      • Password cracking using rainbow tables.

Future Development

The list of security checks will be continuously expanded with additional checks and verifications.

Usage

To run GPOHunter, use the following command:

python gpo_analyzer_cli.py -u USERNAME -p PASSWORD -d DOMAIN -dc DC_HOST [options]

Options:

  • -H, --hash: NTLM hash for Pass-the-Hash.
  • -o, --output: Path to the output file.
  • -f, --format: Output format (json, csv, html).
  • -v, --verbose: Verbose output.
  • --show-xml: Show raw XML content of GPO files.

Requirements

  • Python 3.7+
  • ldap3
  • impacket
  • colorama
  • pycryptodome

Installation

Clone the repository. Install the required packages:

pip install -r requirements.txt

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language Model Security

garak checks if an LLM can be made to fail in a way we don't…

14 hours ago

Vermilion : Mastering Linux Post-Exploitation For Red Team Success

Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…

14 hours ago

AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration

ADCFFS is a PowerShell script that can be used to exploit the AD CS container…

14 hours ago

Usage Of Tartufo – A Comprehensive Guide To Securing Your Git Repositories

Tartufo will, by default, scan the entire history of a git repository for any text…

14 hours ago

Loco : A Rails-Inspired Framework For Rust Developers

Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…

2 days ago

Monolith : The Ultimate Tool For Storing Entire Web Pages As Single HTML Files

A data hoarder’s dream come true: bundle any web page into a single HTML file.…

2 days ago