HN Reader

NewTopBestAskShowJob
Show HN: Visualizing AD data for security with Python and Obsidian
score icon3
comment icon0
1 day agoby jackson12t
I put this tool together a few years back, and just recently got around to making it robust enough to share: https://github.com/pangolinsec/shihtzu

It parses ldapsearch or dsquery output and writes markdown files with some extra logic added in so you can visualize nested memberships when you open the folder with Obsidian and use the graph view--it's kind of like a very low-powered Bloodhound (https://github.com/SpecterOps/BloodHound) in that sense, but it is also much quieter. It also parses `useraccountcontrol` and some of the logon-relevant attributes in AD to automatically tag accounts that are particularly interesting or uninteresting to attackers.

Some core features: - Parses LDAP attributes from text files into structured Obsidian markdown - Intelligently categorizes objects as Users, Groups, or Computers - Automatically identifies administrators and administrative privileges - Detects potentially risky account configurations (stale accounts, low logon counts) - Creates Obsidian links between related objects to enable network visualization - Processes UserAccountControl (UAC) values with explanations - Converts Windows timestamps to human-readable format - Smart append mode that only adds new data to existing files - Tagging for easy filtering and searching in Obsidian

It's not novel, but it's been quite useful for me in a few situations.

No comments