NtdsAudit v2.0.10 releases: Active Directory audit utility
NtdsAudit is an application to assist in auditing Active Directory databases.
It provides some useful statistics relating to accounts and passwords, as shown in the following example. It can also be used to dump password hashes for later cracking.
Changelog v2.0.10
-
Add flag to allow anonymisation of sensitive output files.
Usage
For example, the following command will display statistics, output a file pwdump.txt containing password hashes, and output a file users.csv containing details for each user account.
ntdsaudit ntds.dit -s SYSTEM -p pwdump.txt -u users.csv
Obtaining the required files
NtdsAudit requires the ntds.dit Active Directory database, and optionally the SYSTEM registry hive if dumping password hashes. These files are locked by a domain controller and as such cannot be simply copied and pasted. The recommended method of obtaining these files from a domain controller is using the builtin ntdsutil utility.
- Open a command prompt (cmd.exe) as an administrator. To open a command prompt as an administrator, click Start. In Start Search, type Command Prompt. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, enter the appropriate credentials (if requested) and confirm that the action it displays is what you want, and then click Continue.
- At the command prompt, type the following command, and then press ENTER:
ntdsutil - At the ntdsutil prompt, type the following command, and then press ENTER:
activate instance ntds - At the ntdsutil prompt, type the following command, and then press ENTER:
ifm - At the ifm prompt, type the following command, and then press ENTER:
create full <Drive>:\<Folder>
Where <Drive>:\<Folder> is the path to the folder where you want the files to be created.
Source: https://github.com/Dionach/