Commit graph

10 commits

Author SHA1 Message Date
wiz
bb579283d0 *: bump PKGREVISION for egg.mk users
They now have a tool dependency on py-setuptools instead of a DEPENDS
2022-01-04 20:53:26 +00:00
nia
ab845b2028 net: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts...):

net/radsecproxy/distinfo

The following distfiles could not be fetched (fetched conditionally?):

./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
2021-10-26 11:05:20 +00:00
nia
5c85662953 net: Remove SHA1 hashes for distfiles 2021-10-07 14:41:10 +00:00
adam
2e24c28e26 py-ldapdomaindump: updated to 0.9.3
0.9.3:
Unknown changes
2020-06-18 17:02:45 +00:00
adam
ccb7dea739 py-ldapdomaindump: add ALTERNATIVES 2020-05-26 22:44:16 +00:00
adam
523d63a532 py-ldapdomaindump: updated to 0.9.2
0.9.2:
Unknown changes
2020-05-19 12:39:04 +00:00
leot
41ede86ff7 py-ldapdomaindump: Sort PLIST 2020-05-18 08:45:34 +00:00
nikita
343b288f64 py-ldapdomaindump: fix DEPENDS for py-dns 2020-04-30 12:19:36 +00:00
nikita
8af9195689 py-ldapdomaindump: bump, use py-dns 2020-04-30 12:11:10 +00:00
nikita
05ff947b0c Add net/py-ldapdomaindump Version 0.9.1
In an Active Directory domain, a lot of interesting information can be
retrieved via LDAP by any authenticated user (or machine). This makes
LDAP an interesting protocol for gathering information in the recon
phase of a pentest of an internal network. A problem is that data from
LDAP often is not available in an easy to read format.

ldapdomaindump is a tool which aims to solve this problem, by
collecting and parsing information available via LDAP and outputting
it in a human readable HTML format, as well as machine readable json
and csv/tsv/greppable files.

The tool was designed with the following goals in mind:
- Easy overview of all users/groups/computers/policies in the domain
- Authentication both via username and password, as with NTLM hashes
  (requires ldap3 >=1.3.1)
- Possibility to run the tool with an existing authenticated
  connection to an LDAP service, allowing for integration with
  relaying tools such as impackets ntlmrelayx

The tool outputs several files containing an overview of objects in
the domain:
- domain_groups: List of groups in the domain
- domain_users: List of users in the domain
- domain_computers: List of computer accounts in the domain
- domain_policy: Domain policy such as password requirements and
  lockout policy
- domain_trusts: Incoming and outgoing domain trusts, and their
  properties

As well as two grouped files:
- domain_users_by_group: Domain users per group they are member of
- domain_computers_by_os: Domain computers sorted by Operating System
2020-04-30 11:48:42 +00:00