ActiveDirectoryAttackTool (ADAT) tool is used to assist CTF players and Penetration testers with helpful commands to run against an Active Directory Domain Controller. This tool is best utilized using a set of known working credentials against the host.
Standard usage
bash ADAT.sh -u ViperOne -p Password123 -t 10.10.10.100 -d Security.local
Usage with LDAP base search
bash ADAT.sh -u ViperOne -p Password123 -t 10.10.10.100 -d Security.local -l "DC=Security,DC=Local"
Usage with GitHub for script repositories (Target system has internet access)
bash ADAT.sh -u ViperOne -p Password123 -t 10.10.10.100 -d Security.local
If the system you are testing has no internet access or is a CTF machine, ADAT will download the required GitHub repositories to your attacking system. Ensure you specify the -L
parameter and set both the LocalIP and LocalPort variables within the script to that of your attacking system.
bash ADAT.sh -u ViperOne -p Password123 -t 10.10.10.100 -d Security.local -L
ADAT will run a http python3 server on the attacking system using the LocalIP and LocalPort parameters.
Usage for non domain joined systems, whilst not officially supported by ADAT, many of the commands can be run against a standalone Windows system.
bash ADAT.sh -u ViperOne -p Password123 -t 10.10.10.100 -d . -L
bash ADAT.sh -u ViperOne -p Password123 -t 10.10.10.100 -d WORKGROUP -L
Null mode is useful for when you do not have any valid usernames or credentials to run against the target Domain Controller.
bash ADAT.sh -t 10.10.10.100 -d Security.local -N
Some of the protocols ADAT prints out commands for:
- DNS
- Kerberos
- LDAP
- MSSQL
- NTP
- RDP
- SMB
- WinRM
Some of the tools ADAT prints out commands for:
- BloodHound
- Crackmapexec (Including modules and PowerShell commands)
- Impacket toolset
- Metasploit
- Nmap
- ldapdomaindump
- ldapsearch
- pywerview
- xfreerdp
ADAT produces commands for both external and internal usage.
ADAT is OSCP friendly, the commands it prints out might not be. Please be cautious about what commands and scripts invoke before running in an exam environment.
The resulting commands printed by ADAT should only be used within an authorized envionment. The author is not responsible for any damages caused.