Skip to content

Latest commit

 

History

History
29 lines (17 loc) · 1.34 KB

README.md

File metadata and controls

29 lines (17 loc) · 1.34 KB

SSSD-creds

Using this bash script it is possible to extract Active Directory accounts hashes when credential caching is enabled in SSSD.

bash analyze.sh [$path]

Without input arguments it takes the SSSD default path "/var/lib/sss/db/" but you can use a different one. If tdbdump is not installed it just lists the ldb files which contain the hashes, you can install it ("apt install tdb-tools") or exfiltrate these files:

image1

In a system with tdbdump installed the script extracts the cached accounts and hashes, dumping the results to the file "hashes.txt"

image2 image3

The hashes can then be cracked using Hashcat or John the Ripper:

john hashes.txt --format=sha512crypt

image4

Sources

I created the script after reading this presentation by Tim (Wadhwa-)Brown: Where 2 worlds collide - Bringing Mimikatz et al to UNIX