Skip to content

hex-3030/Getnp-Checker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

ASREPRoasting :

we can use a technique called ASREPRoasting, meaning if a user does not have the Kerberos preauthentication property selected it is possible to retrieve the password hash from that user. this tool which can query the AD and if the property above is not selective it will export their TGT.

Getnp-Checker

Retrieving Kerberos Tickets hat will allow us to query ASReproastable accounts from the Key Distribution Center. The only thing that's necessary to query accounts is a valid set of usernames which we enumerated previously via Kerbrute.

WARNING / Legal: This tool interacts with Active Directory and authentication services. Do not run it against systems you do not own or do not have explicit written permission to test. The author is not responsible for misuse.

Goal

Run GetNPUsers.py against a list of accounts, stream output, and make success indicators obvious by printing them in color and saving findings to a local artifact file for later review.

Features

  • ANSI-colored results (choose green/red for success)
  • Detects $krb5asrep$23$, "getting its TGT", AS-REP, NTLM and other patterns
  • Takes users via embedded list or --users-file
  • --getnp, --domain, --extra-flags, and --timeout options
  • Logs per-run output to logs/ and appends artifacts to found_results.txt

Requirements

  • Python 3 (for the Python runner)
  • GetNPUsers.py from Impacket (make sure it's installed and available)
  • Bash (for the Bash script)
  • Terminal that supports ANSI colors (for colored output)

Usage examples

Bash (quick)

# example with included Python script
python3 Check_GetNPUsers.py  --domain spookysec.local --success-color red

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages