Skip to content

A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.

Notifications You must be signed in to change notification settings

p0dalirius/DescribeNTSecurityDescriptor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.
GitHub release (latest by date) YouTube Channel Subscribers

Features

Demonstration

Here is an example of the output of the tool when parsing the ntSecurityDescriptor contained in the file example_value.txt. This file contains a raw ntSecurityDescriptor structure in hex dump format:

0100148cc4090000e0090000140000008c0000000400780002000000075a38002000000003000000be3b0ef3f09fd111b6030000f80367c1a57a96bfe60dd011a28500aa003049e2010100000000000100000000075a380020000000030000
...
02000000000005200000002a02000000121800bd010f0001020000000000052000000020020000010500000000000515000000a3cd06bf0e0fe808c335b8e600020000010500000000000515000000a3cd06bf0e0fe808c335b8e600020000

Using DescribeNTSecurityDescriptor.py, we can open the file and parse its content precisely:

./DescribeNTSecurityDescriptor.py ./example_value.txt

example of the output

Usage

$ ./DescribeNTSecurityDescriptor.py 
usage: DescribeNTSecurityDescriptor.py [-h] [-v] value

Parse and describe the contents of a raw ntSecurityDescriptor structure

positional arguments:
  value          The value to be described by the NTSecurityDescriptor

options:
  -h, --help     show this help message and exit
  -v, --verbose  Verbose mode. (default: False)

Example

./DescribeNTSecurityDescriptor.py -u Administrator -p 'Admin123!' -d LAB --dc-ip 10.0.0.101 -D "CN=user user,CN=Users,DC=LAB,DC=local" --summary --describe

Contributing

Pull requests are welcome. Feel free to open an issue if you want to add other features.