ADRecon is a tool which extracts various artifacts (as highlighted below) out of an AD environment in a specially formatted Microsoft Excel report that includes summary views with metrics to facilitate analysis.
The report can provide a holistic picture of the current state of the target AD environment. The tool is useful to various classes of security professionals like auditors, DIFR, students, administrators, etc. It can also be an invaluable post-exploitation tools for a penetration tester. It can be ran from any workstation that is connected to the environment even hosts that are not domain members. Furthermore, the tool can be executed in the context of a non-privileged (i.e. standard domain user) accounts. Fine Grained Password Policy, LAPS and BitLocker may require Privileged user accounts. The tool will use Microsoft Remote Server Administration Tools (RSAT) if available, otherwise it will communicate with the Domain Controller using LDAP. The following information is gathered by the tool:
- Domains in the Forest and other attributes such as Sites;
- Domain Password Policy;
- Domain Controllers and their roles;
- Users and their attributes;
- Service Principal Names;
- Groups and and their members;
- Organizational Units and their ACLs;
- Group Policy Object details;
- DNS Zones;
- Computers and their attributes;
- LAPS passwords (if implemented); and
- BitLocker Recovery Keys (if implemented).
- .NET Framework 3.0 or later (Windows 7 includes 3.0)
- PowerShell 2.0 or later (Windows 7 includes 2.0)
- Microsoft Excel (to generate the report)
- Remote Server Administration Tools (RSAT):
If you have git installed, you can start by cloning the repository:
git clone https://github.com/sense-of-security/ADRecon.git
Otherwise, you can download a zip archive of the latest release. The intent is to always keep the master branch in a working state.
To run ADRecon on a domain member host.
PS C:> .ADRecon.ps1
To run ADRecon on a domain member host as a different user.
PS C:>.ADRecon.ps1 -DomainController <IP or FQDN> -Credential <domainusername>
To run ADRecon on a non-member host using LDAP.
PS C:>.ADRecon.ps1 -Protocol LDAP -DomainController <IP or FQDN> -Credential <domainusername>
To run ADRecon with specific modules on a non-member host with RSAT.
PS C:>.ADRecon.ps1 -Protocol ADWS -DomainController <IP or FQDN> -Credential <domainusername> -Collect Domian, DCs
To generate the ADRecon-Report.xlsx based on ADRecon output.
PS C:>.ADRecon.ps1 -GenExcel C:ADRecon-Report-<timestamp>
When you run ADRecon, a
ADRecon-Report-<timestamp> folder will be created which will contain ADRecon-Report.xlsx and CSV-Folder with the raw files.