marcostolosa / gpp-decrypt

Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.

Home Page:https://medium.com/infosec-adventures

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

gpp-decrypt

made-with-python built-with-love

Note: The idea is heavily based on this project: https://github.com/BustedSec/gpp-decrypt

This tool is written in Python 3 to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.

Download

git clone https://github.com/t0thkr1s/gpp-decrypt

Install

The script has only 2 dependencies:

You can install these by typing:

python3 setup.py install

Run

python3 gpp-decrypt.py -f [groups.xml]

or

python3 gpp-decrypt.py -c [cpassword]

Screenshot

Screenshot

Disclaimer

This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this tool and software.

License

This project is licensed under the GPLv3 License - see the LICENSE file for details

About

Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.

https://medium.com/infosec-adventures

License:GNU General Public License v3.0


Languages

Language:Python 96.0%Language:Dockerfile 4.0%