{"id":31606,"date":"2024-01-02T09:09:27","date_gmt":"2024-01-02T09:09:27","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31606"},"modified":"2024-01-02T09:09:31","modified_gmt":"2024-01-02T09:09:31","slug":"knowsmore","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/knowsmore\/","title":{"rendered":"KnowsMore: Active Directory and Password Analysis Tool"},"content":{"rendered":"\n<p>KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes with that let you look at and control Active Directory settings, BloodHound data, NTDS hashes, and crack passwords. <\/p>\n\n\n\n<p>Users can import and connect important data, check the strength of passwords, look for users and hashes, and even send cracked credentials straight to a BloodHound Neo4j Database with KnowsMore. This tool makes it easier to understand and protect Active Directory environments, which makes it very useful for security experts and managers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Main features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;Import NTLM Hashes from .ntds output txt file (generated by CrackMapExec or secretsdump.py)<\/li>\n\n\n\n<li>&nbsp;Import NTLM Hashes from NTDS.dit and SYSTEM<\/li>\n\n\n\n<li>&nbsp;Import Cracked NTLM hashes from hashcat output file<\/li>\n\n\n\n<li>&nbsp;Import BloodHound ZIP or JSON file<\/li>\n\n\n\n<li>&nbsp;BloodHound importer (import JSON to Neo4J without BloodHound UI)<\/li>\n\n\n\n<li>&nbsp;Analyse the quality of password (length , lower case, upper case, digit, special and latin)<\/li>\n\n\n\n<li>&nbsp;Analyse similarity of password with company and user name<\/li>\n\n\n\n<li>&nbsp;Search for users, passwords and hashes<\/li>\n\n\n\n<li>&nbsp;Export all cracked credentials direct to BloodHound Neo4j Database as &#8216;owned object&#8217;<\/li>\n\n\n\n<li>&nbsp;Other amazing features&#8230;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#getting-stats\"><\/a><strong>Getting stats<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --stats<\/code><\/pre>\n\n\n\n<p>This command will produce several statistics about the passwords like the output bellow<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>KnowsMore v0.1.4 by Helvio Junior\r\nActive Directory, BloodHound, NTDS hashes and Password Cracks correlation tool\r\nhttps:&#47;&#47;github.com\/helviojunior\/knowsmore\r\n    \r\n &#91;+] Startup parameters\r\n     command line: knowsmore --stats \r\n     module: stats\r\n     database file: knowsmore.db\r\n  \r\n &#91;+] start time 2023-01-11 03:59:20\r\n&#91;?] General Statistics\r\n+-------+----------------+-------+\r\n|   top | description    |   qty |\r\n|-------+----------------+-------|\r\n|     1 | Total Users    | 95369 |\r\n|     2 | Unique Hashes  | 74299 |\r\n|     3 | Cracked Hashes | 23177 |\r\n|     4 | Cracked Users  | 35078 |\r\n+-------+----------------+-------+\r\n\r\n &#91;?] General Top 10 passwords\r\n+-------+-------------+-------+\r\n|   top | password    |   qty |\r\n|-------+-------------+-------|\r\n|     1 | password    |  1111 |\r\n|     2 | 123456      |   824 |\r\n|     3 | 123456789   |   815 |\r\n|     4 | guest       |   553 |\r\n|     5 | qwerty      |   329 |\r\n|     6 | 12345678    |   277 |\r\n|     7 | 111111      |   268 |\r\n|     8 | 12345       |   202 |\r\n|     9 | secret      |   170 |\r\n|    10 | sec4us      |   165 |\r\n+-------+-------------+-------+\r\n\r\n &#91;?] Top 10 weak passwords by company name similarity\r\n+-------+--------------+---------+----------------------+-------+\r\n|   top | password     |   score |   company_similarity |   qty |\r\n|-------+--------------+---------+----------------------+-------|\r\n|     1 | company123   |    7024 |                   80 |  1111 |\r\n|     2 | Company123   |    5209 |                   80 |   824 |\r\n|     3 | company      |    3674 |                  100 |   553 |\r\n|     4 | Company@10   |    2080 |                   80 |   329 |\r\n|     5 | company10    |    1722 |                   86 |   268 |\r\n|     6 | Company@2022 |    1242 |                   71 |   202 |\r\n|     7 | Company@2024 |    1015 |                   71 |   165 |\r\n|     8 | Company2022  |     978 |                   75 |   157 |\r\n|     9 | Company10    |     745 |                   86 |   116 |\r\n|    10 | Company21    |     707 |                   86 |   110 |\r\n+-------+--------------+---------+----------------------+-------+\r\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#simple\"><\/a><strong>Simple<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>pip3 install --upgrade knowsmore<\/code><\/pre>\n\n\n\n<p><em>Note:<\/em>\u00a0If you face problem with dependency version\u00a0<a href=\"https:\/\/github.com\/helviojunior\/knowsmore\/blob\/main\/PYVENV.md\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Check the Virtual ENV file<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#execution-flow\"><\/a><strong>Execution Flow<\/strong><\/h2>\n\n\n\n<p>There is no an obligation order to import data, but to get better correlation data we suggest the following execution flow:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Create database file<\/li>\n\n\n\n<li>Import BloodHound files\n<ol class=\"wp-block-list\">\n<li>Domains<\/li>\n\n\n\n<li>GPOs<\/li>\n\n\n\n<li>OUs<\/li>\n\n\n\n<li>Groups<\/li>\n\n\n\n<li>Computers<\/li>\n\n\n\n<li>Users<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li>Import NTDS file<\/li>\n\n\n\n<li>Import cracked hashes<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#create-database-file\"><\/a><strong>Create database file<\/strong><\/h2>\n\n\n\n<p>All data are stored in a SQLite Database<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --create-db<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Importing BloodHound files<\/strong><\/h2>\n\n\n\n<p>We can import all full BloodHound files into KnowsMore, correlate data, and sync it to Neo4J BloodHound Database. So you can use only KnowsMore to import JSON files directly into Neo4j database instead of use&nbsp;<code>extremely slow BloodHound User Interface<\/code><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Bloodhound ZIP File\r\nknowsmore --bloodhound --import-data ~\/Desktop\/client.zip\r\n\r\n# Bloodhound JSON File\r\nknowsmore --bloodhound --import-data ~\/Desktop\/20220912105336_users.json<\/code><\/pre>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;The KnowsMore is capable to import BloodHound ZIP File and JSON files, but we recommend to use ZIP file, because the KnowsMore will automatically order the files to better data correlation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#sync-data-to-neo4j-bloodhound-database\"><\/a><strong>Sync data to Neo4j BloodHound database<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># Bloodhound ZIP File\r\nknowsmore --bloodhound --sync 10.10.10.10:7687 -d neo4j -u neo4j -p 12345678<\/code><\/pre>\n\n\n\n<p><strong>Note:<\/strong>\u00a0The KnowsMore implementation of bloodhount-importer was inpired from\u00a0<a href=\"https:\/\/github.com\/fox-it\/bloodhound-import\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fox-It BloodHound Import<\/a>\u00a0implementation. We implemented several changes to save all data in KnowsMore SQLite database and after that do an incremental sync to Neo4J database. With this strategy we have several benefits such as at least 10x faster them original BloodHound User interface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#importing-ntds-file\"><\/a><strong>Importing NTDS file<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#option-1\"><\/a><strong>Option 1<\/strong><\/h3>\n\n\n\n<p><strong>Note:<\/strong>\u00a0Import hashes and clear-text passwords directly from NTDS.dit and SYSTEM registry<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --secrets-dump -target LOCAL -ntds ~\/Desktop\/ntds.dit -system ~\/Desktop\/SYSTEM<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Option 2<\/strong><\/h3>\n\n\n\n<p><strong>Note:<\/strong>\u00a0First use the secretsdump to extract ntds hashes with the command bellow<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>secretsdump.py -ntds ntds.dit -system system.reg -hashes lmhash:ntlmhash LOCAL -outputfile ~\/Desktop\/client_name<\/code><\/pre>\n\n\n\n<p>After that import<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --ntlm-hash --import-ntds ~\/Desktop\/client_name.ntds<\/code><\/pre>\n\n\n\n<p>Generating a custom wordlist<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --word-list -o \"~\/Desktop\/Wordlist\/my_custom_wordlist.txt\" --batch --name company_name<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Importing cracked hashes<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#cracking-hashes\"><\/a><strong>Cracking hashes<\/strong><\/h3>\n\n\n\n<p>First extract all hashes to a txt file<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Extract NTLM hashes to file\r\nnowsmore --ntlm-hash --export-hashes \"~\/Desktop\/ntlm_hash.txt\"\r\n\r\n# Or, extract NTLM hashes from NTDS file\r\ncat ~\/Desktop\/client_name.ntds | cut -d ':' -f4 > ntlm_hashes.txt<\/code><\/pre>\n\n\n\n<p>In order to crack the hashes, I usually use\u00a0<code>hashcat<\/code>\u00a0with the command bellow<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Wordlist attack\r\nhashcat -m 1000 -a 0 -O -o \"~\/Desktop\/cracked.txt\" --remove \"~\/Desktop\/ntlm_hash.txt\" \"~\/Desktop\/Wordlist\/*\"\r\n\r\n# Mask attack\r\nhashcat -m 1000 -a 3 -O --increment --increment-min 4 -o \"~\/Desktop\/cracked.txt\" --remove \"~\/Desktop\/ntlm_hash.txt\" ?a?a?a?a?a?a?a?a<\/code><\/pre>\n\n\n\n<p>importing hashcat output file<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --ntlm-hash --company clientCompanyName --import-cracked ~\/Desktop\/cracked.txt<\/code><\/pre>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;Change&nbsp;<strong>clientCompanyName<\/strong>&nbsp;to name of your company<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#wipe-sensitive-data\"><\/a><strong>Wipe sensitive data<\/strong><\/h2>\n\n\n\n<p>As the passwords and his hashes are extremely sensitive data, there is a module to replace the clear text passwords and respective hashes.<\/p>\n\n\n\n<p><strong>Note:<\/strong>\u00a0This command will keep all generated statistics and imported user data.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --wipe<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>BloodHound Mark as owned<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/helviojunior\/knowsmore#one-user\"><\/a><strong>One User<\/strong><\/h3>\n\n\n\n<p>During the assessment you can find (in a several ways) users password, so you can add this to the Knowsmore database<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --user-pass --username administrator --password Sec4US@2023\r\n\r\n# or adding the company name\r\n\r\nknowsmore --user-pass --username administrator --password Sec4US@2023 --company sec4us<\/code><\/pre>\n\n\n\n<p>Integrate all credentials cracked to Neo4j Bloodhound database<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>knowsmore --bloodhound --mark-owned 10.10.10.10 -d neo4j -u neo4j -p 123456<\/code><\/pre>\n\n\n\n<p>To remote connection make sure that Neo4j database server is accepting remote connection. Change the line bellow at the config file\u00a0<strong>\/etc\/neo4j\/neo4j.conf<\/strong>\u00a0and restart the service.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>server.bolt.listen_address=0.0.0.0:7687<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes with that let you look at and control Active Directory settings, BloodHound data, NTDS hashes, and crack passwords. Users can import and connect important data, check the strength of passwords, look for [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31608,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6478],"class_list":["post-31606","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-knowsmore"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KnowsMore: Active Directory and Password Analysis Tool<\/title>\n<meta name=\"description\" content=\"KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KnowsMore: Active Directory and Password Analysis Tool\" \/>\n<meta property=\"og:description\" content=\"KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-02T09:09:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-02T09:09:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"KnowsMore: Active Directory and Password Analysis Tool\",\"datePublished\":\"2024-01-02T09:09:27+00:00\",\"dateModified\":\"2024-01-02T09:09:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\"},\"wordCount\":606,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"KnowsMore\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/knowsmore\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\",\"name\":\"KnowsMore: Active Directory and Password Analysis Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp\",\"datePublished\":\"2024-01-02T09:09:27+00:00\",\"dateModified\":\"2024-01-02T09:09:31+00:00\",\"description\":\"KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/knowsmore\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KnowsMore: Active Directory and Password Analysis Tool","description":"KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/knowsmore\/","og_locale":"en_US","og_type":"article","og_title":"KnowsMore: Active Directory and Password Analysis Tool","og_description":"KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes","og_url":"https:\/\/kalilinuxtutorials.com\/knowsmore\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-01-02T09:09:27+00:00","article_modified_time":"2024-01-02T09:09:31+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"KnowsMore: Active Directory and Password Analysis Tool","datePublished":"2024-01-02T09:09:27+00:00","dateModified":"2024-01-02T09:09:31+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/"},"wordCount":606,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","KnowsMore"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/knowsmore\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/","url":"https:\/\/kalilinuxtutorials.com\/knowsmore\/","name":"KnowsMore: Active Directory and Password Analysis Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","datePublished":"2024-01-02T09:09:27+00:00","dateModified":"2024-01-02T09:09:31+00:00","description":"KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/knowsmore\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/knowsmore\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEid7cOGDzKRlkkCGFGmiog-wVGK5z4Dso_o6a_9w1yvk_qOvNVSlYCktilBIbLfMQV8WCaoYoGWDrv2C9QHmTg7l5_42OH4wm6JKjRXIxkBTodpx_DfRGXVSyW_qEd4-lV1GDucSbaMKCGdI-_67Y2yh2PX-2W5zXJ2dTurHzkMPG-E7Jyb0iTpEt-EgA\/s16000\/KnowsMore.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11597,"url":"https:\/\/kalilinuxtutorials.com\/lil-pwny\/","url_meta":{"origin":31606,"position":0},"title":"Lil PWNY : Auditing Active Directory Passwords Using Multiprocessing In Python","author":"R K","date":"October 5, 2020","format":false,"excerpt":"Lil Pwny is a Python application to perform an offline audit of NTLM hashes of users' passwords, recovered from Active Directory, against known compromised passwords from Have I Been Pwned. The usernames of any accounts matching HIBP will be returned in a .txt file There are also additional features: Ability\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":31606,"position":1},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24926,"url":"https:\/\/kalilinuxtutorials.com\/linwinpwn\/","url_meta":{"origin":31606,"position":2},"title":"linWinPwn : A Bash Script That Automates A Number Of Active Directory Enumeration And Vulnerability Checks","author":"R K","date":"May 29, 2022","format":false,"excerpt":"linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks. The script leverages and is dependent of a number of tools including: impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump. Setup Git clone the repository and make the script executable git clone https:\/\/github.com\/lefayjey\/linWinPwncd linWinPwn;\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1dTKAEKE2a9H0lEdbjr8EZ3zm8ghjN1TYTFdAaLMbzu5SZWJjiQlnn-T0cvBWbBo3CmVdAXUMtUYdOkxerferkBVtJF5_drU69D1QB8qXmuQ7cnrO2FhXUj1e8Qyy6HD20zvCgV9e4-nENuTWCI6cX72t9iUi4bnv6KG-sYLiREHqGtjGvIuDUGD-\/s728\/download.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1dTKAEKE2a9H0lEdbjr8EZ3zm8ghjN1TYTFdAaLMbzu5SZWJjiQlnn-T0cvBWbBo3CmVdAXUMtUYdOkxerferkBVtJF5_drU69D1QB8qXmuQ7cnrO2FhXUj1e8Qyy6HD20zvCgV9e4-nENuTWCI6cX72t9iUi4bnv6KG-sYLiREHqGtjGvIuDUGD-\/s728\/download.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1dTKAEKE2a9H0lEdbjr8EZ3zm8ghjN1TYTFdAaLMbzu5SZWJjiQlnn-T0cvBWbBo3CmVdAXUMtUYdOkxerferkBVtJF5_drU69D1QB8qXmuQ7cnrO2FhXUj1e8Qyy6HD20zvCgV9e4-nENuTWCI6cX72t9iUi4bnv6KG-sYLiREHqGtjGvIuDUGD-\/s728\/download.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1dTKAEKE2a9H0lEdbjr8EZ3zm8ghjN1TYTFdAaLMbzu5SZWJjiQlnn-T0cvBWbBo3CmVdAXUMtUYdOkxerferkBVtJF5_drU69D1QB8qXmuQ7cnrO2FhXUj1e8Qyy6HD20zvCgV9e4-nENuTWCI6cX72t9iUi4bnv6KG-sYLiREHqGtjGvIuDUGD-\/s728\/download.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6355,"url":"https:\/\/kalilinuxtutorials.com\/nebulousad-automated-credential-auditing-tool\/","url_meta":{"origin":31606,"position":3},"title":"NebulousAD : Automated Credential Auditing Tool","author":"R K","date":"August 30, 2019","format":false,"excerpt":"NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a redact-by-group feature that will not dump hashes or check against the api for accounts in specific groups (such as domain administrators). Installation Simply download the precompiled release (requires no python interpreter),\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26804,"url":"https:\/\/kalilinuxtutorials.com\/aced\/","url_meta":{"origin":31606,"position":4},"title":"Aced : Tool to parse and resolve a single targeted Active Directory principal&#8217;s DACL","author":"R K","date":"September 10, 2022","format":false,"excerpt":"Aced is a tool to parse and resolve a single targeted Active Directory principal's DACL. Aced will identify interesting inbound access allowed privileges against the targeted account, resolve the SIDS of the inbound permissions, and present that data to the operator. Additionally, the logging features of\u00a0pyldapsearch\u00a0have been integrated with Aced\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6QNL3Wml7fRgXOomk5XuVWYxGozF9t2yv_mBOmYqhFzZ3c-jhaAcps7Uwq4ZUlc145sTxLrwrx9cod9GEzQr722Cg9kOzRGfI10YeotzITFZuwfbAPbRVThpNYN_9RQslEDbCXJpd4FADpdniJSKRLALQybDeGmfExMj3wM999ji8rHBwB-PpBl9k\/s728\/download.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6QNL3Wml7fRgXOomk5XuVWYxGozF9t2yv_mBOmYqhFzZ3c-jhaAcps7Uwq4ZUlc145sTxLrwrx9cod9GEzQr722Cg9kOzRGfI10YeotzITFZuwfbAPbRVThpNYN_9RQslEDbCXJpd4FADpdniJSKRLALQybDeGmfExMj3wM999ji8rHBwB-PpBl9k\/s728\/download.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6QNL3Wml7fRgXOomk5XuVWYxGozF9t2yv_mBOmYqhFzZ3c-jhaAcps7Uwq4ZUlc145sTxLrwrx9cod9GEzQr722Cg9kOzRGfI10YeotzITFZuwfbAPbRVThpNYN_9RQslEDbCXJpd4FADpdniJSKRLALQybDeGmfExMj3wM999ji8rHBwB-PpBl9k\/s728\/download.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6QNL3Wml7fRgXOomk5XuVWYxGozF9t2yv_mBOmYqhFzZ3c-jhaAcps7Uwq4ZUlc145sTxLrwrx9cod9GEzQr722Cg9kOzRGfI10YeotzITFZuwfbAPbRVThpNYN_9RQslEDbCXJpd4FADpdniJSKRLALQybDeGmfExMj3wM999ji8rHBwB-PpBl9k\/s728\/download.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":30973,"url":"https:\/\/kalilinuxtutorials.com\/linikatzv2\/","url_meta":{"origin":31606,"position":5},"title":"LinikatzV2 &#8211; Unveiling UNIX Secrets in Active Directory Environments","author":"Varshini","date":"October 23, 2023","format":false,"excerpt":"LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX computers joined to Active Directory, using various methods for credential mining. This tool needs\u00a0root privileges\u00a0to be run on the host system. It allows extraction of : Hashed stored in files\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbI4h4o8gGN6Tn8ESI4hHMUFmaHmqpfWX_zayzZw7qIWLqDy-7hgb_8ZabRv8n1Ih1d-GoGg-pFWshXKtQaVpQOktYcesi5JGCS1mcDrFnkp05OqFb_VmMPlE55BMckbkmZZQ2GvWK9TfBcfxe-APglWJTagO-Mm0SJF28hUK643CqvG4ogwDYKulM-g\/s16000\/Linikat.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbI4h4o8gGN6Tn8ESI4hHMUFmaHmqpfWX_zayzZw7qIWLqDy-7hgb_8ZabRv8n1Ih1d-GoGg-pFWshXKtQaVpQOktYcesi5JGCS1mcDrFnkp05OqFb_VmMPlE55BMckbkmZZQ2GvWK9TfBcfxe-APglWJTagO-Mm0SJF28hUK643CqvG4ogwDYKulM-g\/s16000\/Linikat.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbI4h4o8gGN6Tn8ESI4hHMUFmaHmqpfWX_zayzZw7qIWLqDy-7hgb_8ZabRv8n1Ih1d-GoGg-pFWshXKtQaVpQOktYcesi5JGCS1mcDrFnkp05OqFb_VmMPlE55BMckbkmZZQ2GvWK9TfBcfxe-APglWJTagO-Mm0SJF28hUK643CqvG4ogwDYKulM-g\/s16000\/Linikat.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbI4h4o8gGN6Tn8ESI4hHMUFmaHmqpfWX_zayzZw7qIWLqDy-7hgb_8ZabRv8n1Ih1d-GoGg-pFWshXKtQaVpQOktYcesi5JGCS1mcDrFnkp05OqFb_VmMPlE55BMckbkmZZQ2GvWK9TfBcfxe-APglWJTagO-Mm0SJF28hUK643CqvG4ogwDYKulM-g\/s16000\/Linikat.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31606"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31606\/revisions"}],"predecessor-version":[{"id":31607,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31606\/revisions\/31607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31608"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}