Recently, a colleague encountered a strange situation: an undetermined security product was killing LDAP connections performed by ldap3 (NTLM). A simple bypass was to force SIMPLE authentication (pun intended). I've implemented it in #pywerview.

https://github.com/the-useless-one/pywerview/tree/develop

🌻

Release pywerview v0.7.3 · the-useless-one/pywerview

Modifications Workaround to use LDAP_SERVER_SD_FLAGS until impacket 0.13 is released By default, pywerview is no longer installed with the kerberos support. If you want it, you need to run pip ins...

GitHub
Release pywerview v0.7.1 · the-useless-one/pywerview

Features get-netpki: returns a list of all the pKIEnrollmentService objects. get-netcerttmpl: returns a list of all the pKICertificateTemplate objects. This function implements the --caname CA-NAM...

GitHub
Release pywerview v0.7.0 · the-useless-one/pywerview

Features pywerview now uses ldap3-bleeding-edge. It will use it until #1139 is merged and released. Modifications When LDAPInvalidCredentialsResult is raised, pywerview parses the error code and...

GitHub

#pywerview 0.6 is out! Five releases this year, whoa, thanks all for using the tool.
I wish you all season's greetings and may you find your way to RID 512 next year.

https://github.com/the-useless-one/pywerview

🌻

GitHub - the-useless-one/pywerview: A (partial) Python rewriting of PowerSploit's PowerView

A (partial) Python rewriting of PowerSploit's PowerView - the-useless-one/pywerview

GitHub
#pywerview can also be used as a library in your scripts! My idea here was to quickly PoC the "Delegations" section of #PingCastle.

I have updated the hunting functions of #pywerview (they were broken for soooo long).

(Beta) test it now: https://github.com/the-useless-one/pywerview/tree/develop

GitHub - the-useless-one/pywerview at develop

A (partial) Python rewriting of PowerSploit's PowerView - GitHub - the-useless-one/pywerview at develop

GitHub
with json output, you can easily pipe the result of a #pywerview command to #jq and perform advanced filtering. Here an example to retrieve AD groups with RID > 1000 (useful for cross forest lateral movement):

Easy ownership audit: you can now retrieve the owner of any AD object with #pywerview.

Beta test it: https://github.com/the-useless-one/pywerview/tree/develop

GitHub - the-useless-one/pywerview at develop

A (partial) Python rewriting of PowerSploit's PowerView - GitHub - the-useless-one/pywerview at develop

GitHub