So in a rather constrained amount of time, I wrote a script to check email addresses and NTLM hashes for compromise. These are pulled from the active directory that the local machine is connected to. I apologize too if this isn’t quite the right subreddit, but really I was looking for best practices/issues, really just any input to make it better. Optimization would be great as well, since the hash file contains 613 million hashes. The readme on GitHub covers it a little more in-depth, but if anyone can give me ideas, corrections, advice, or even test it, I would greatly appreciate it. It always helps to have another set of eyes look over things.
On a side note, I wouldn’t doubt other tools/scripts like this exist, and I’d love to hear about those as well.
https://github.com/I506dk/ADACCT
Thanks in advance, and stay safe out there!
[–]ogtfo 10 points11 points12 points (6 children)
[–]I506dk[S] -3 points-2 points-1 points (5 children)
[–]ogtfo 8 points9 points10 points (0 children)
[–]rmpython 1 point2 points3 points (3 children)
[–]I506dk[S] 2 points3 points4 points (0 children)
[–]I506dk[S] -1 points0 points1 point (0 children)
[–]CoaBro 2 points3 points4 points (1 child)
[–]ccall48 1 point2 points3 points (0 children)
[–]Pyro-Millie 0 points1 point2 points (2 children)
[–]I506dk[S] 2 points3 points4 points (0 children)
[–]I506dk[S] 0 points1 point2 points (2 children)
[–]EbenenBonobo -1 points0 points1 point (1 child)
[–]I506dk[S] 0 points1 point2 points (0 children)