GPOHunter
A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities
Install / Use
/learn @PShlyundin/GPOHunterREADME
GPOHunter - Active Directory Group Policy Security Analyzer
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs). It automates security checks and provides detailed reports on potential vulnerabilities, helping administrators secure their environments.
Features
- Connects to Active Directory using LDAP/LDAPS protocols.
- Supports NTLM authentication and Pass-the-Hash techniques.
- Analyzes all GPOs within the domain.
- Identifies and reports security misconfigurations.
- Displays affected organizational units (OUs) and objects.
- Offers multiple output formats: JSON, CSV, and HTML.
- Provides an option to view detailed XML content of GPO files.
Security Checks
Currently, GPOHunter implements the following security checks:
-
Clear Text Password Storage
- Detects the "ClearTextPassword = 1" setting in GPOs.
- This setting allows passwords to be stored in unencrypted form, posing a critical security risk by exposing credentials.
-
GPP Passwords (MS14-025)
- Identifies encrypted passwords within Group Policy Preferences.
- Examines various GPP files such as Groups.xml, Services.xml, and others.
- These passwords are encrypted with a known key and can be easily decrypted using public information.
-
NetNTLMv1 Authentication Enabled
- Detects insecure LmCompatibilityLevel settings.
- Identifies GPOs that enable NetNTLMv1, which is vulnerable to:
- Relay attacks when combined with Coerce.
- Password cracking using rainbow tables.
Future Development
The list of security checks will be continuously expanded with additional checks and verifications.
Usage
To run GPOHunter, use the following command:
python gpo_analyzer_cli.py -u USERNAME -p PASSWORD -d DOMAIN -dc DC_HOST [options]
Options:
-u,--username: Username for authentication.-p,--password: Password for authentication.-d,--domain: Domain (required).-dc,--dc-host: Domain controller host (required).-H,--hash: NTLM hash for Pass-the-Hash.--dc-ip: IP address of the domain controller to avoid DNS resolution issues.-v,--verbose: Verbose output.--show-xml: Show raw XML content of GPO files.
Requirements
- Python 3.7+
- ldap3
- impacket
- colorama
- pycryptodome
Installation
- Clone the repository.
- Install the required packages:
pip install -r requirements.txt
Example
To analyze GPOs and generate an HTML report:
python gpo_analyzer_cli.py -u USERNAME -p PASSWORD -d DOMAIN -dc DC_HOST
License
This project is licensed under the MIT License - see the LICENSE file for details.
Author
Disclaimer
This tool is intended for security assessment purposes only. Ensure you have proper authorization before scanning Active Directory environments.
Related Skills
node-connect
347.6kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
108.4kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
347.6kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
347.6kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
