What the tool does :
-
takes two ntds database extracts (crackmapexec, secretsdump...)
-
counts hash reuse, and common hashes between databases
-
optionally : takes as input a list of "Domain Admin" users to find password reuse among privileged users
Why the tool does that :
- You just finished your multi-domain internal pentest and you want stats on admin password reuse
py compare_domain_hashes.py ntds1 [-c/--compare ntds2] [-da domain_admin_users_list]
py compare_domain_hashes.py ntds1 # password reuse in a domain
py compare_domain_hashes.py ntds1 -c ntds2 # password reuse in both domains + common hashes
py compare_domain_hashes.py ntds1 -c ntds2 -da da_list # above + domain admins
- exhaustive output of impacted users
- csv output of users