@etcsec-com/etc-collector 1.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.env.example +60 -0
- package/.env.test.example +33 -0
- package/.github/workflows/ci.yml +83 -0
- package/.github/workflows/release.yml +246 -0
- package/.prettierrc.json +10 -0
- package/CHANGELOG.md +15 -0
- package/Dockerfile +57 -0
- package/LICENSE +190 -0
- package/README.md +194 -0
- package/dist/api/controllers/audit.controller.d.ts +21 -0
- package/dist/api/controllers/audit.controller.d.ts.map +1 -0
- package/dist/api/controllers/audit.controller.js +179 -0
- package/dist/api/controllers/audit.controller.js.map +1 -0
- package/dist/api/controllers/auth.controller.d.ts +16 -0
- package/dist/api/controllers/auth.controller.d.ts.map +1 -0
- package/dist/api/controllers/auth.controller.js +146 -0
- package/dist/api/controllers/auth.controller.js.map +1 -0
- package/dist/api/controllers/export.controller.d.ts +27 -0
- package/dist/api/controllers/export.controller.d.ts.map +1 -0
- package/dist/api/controllers/export.controller.js +80 -0
- package/dist/api/controllers/export.controller.js.map +1 -0
- package/dist/api/controllers/health.controller.d.ts +5 -0
- package/dist/api/controllers/health.controller.d.ts.map +1 -0
- package/dist/api/controllers/health.controller.js +16 -0
- package/dist/api/controllers/health.controller.js.map +1 -0
- package/dist/api/controllers/jobs.controller.d.ts +13 -0
- package/dist/api/controllers/jobs.controller.d.ts.map +1 -0
- package/dist/api/controllers/jobs.controller.js +125 -0
- package/dist/api/controllers/jobs.controller.js.map +1 -0
- package/dist/api/controllers/providers.controller.d.ts +15 -0
- package/dist/api/controllers/providers.controller.d.ts.map +1 -0
- package/dist/api/controllers/providers.controller.js +112 -0
- package/dist/api/controllers/providers.controller.js.map +1 -0
- package/dist/api/dto/AuditRequest.dto.d.ts +6 -0
- package/dist/api/dto/AuditRequest.dto.d.ts.map +1 -0
- package/dist/api/dto/AuditRequest.dto.js +3 -0
- package/dist/api/dto/AuditRequest.dto.js.map +1 -0
- package/dist/api/dto/AuditResponse.dto.d.ts +17 -0
- package/dist/api/dto/AuditResponse.dto.d.ts.map +1 -0
- package/dist/api/dto/AuditResponse.dto.js +3 -0
- package/dist/api/dto/AuditResponse.dto.js.map +1 -0
- package/dist/api/dto/TokenRequest.dto.d.ts +6 -0
- package/dist/api/dto/TokenRequest.dto.d.ts.map +1 -0
- package/dist/api/dto/TokenRequest.dto.js +3 -0
- package/dist/api/dto/TokenRequest.dto.js.map +1 -0
- package/dist/api/dto/TokenResponse.dto.d.ts +12 -0
- package/dist/api/dto/TokenResponse.dto.d.ts.map +1 -0
- package/dist/api/dto/TokenResponse.dto.js +3 -0
- package/dist/api/dto/TokenResponse.dto.js.map +1 -0
- package/dist/api/middlewares/authenticate.d.ts +12 -0
- package/dist/api/middlewares/authenticate.d.ts.map +1 -0
- package/dist/api/middlewares/authenticate.js +141 -0
- package/dist/api/middlewares/authenticate.js.map +1 -0
- package/dist/api/middlewares/errorHandler.d.ts +3 -0
- package/dist/api/middlewares/errorHandler.d.ts.map +1 -0
- package/dist/api/middlewares/errorHandler.js +30 -0
- package/dist/api/middlewares/errorHandler.js.map +1 -0
- package/dist/api/middlewares/rateLimit.d.ts +3 -0
- package/dist/api/middlewares/rateLimit.d.ts.map +1 -0
- package/dist/api/middlewares/rateLimit.js +34 -0
- package/dist/api/middlewares/rateLimit.js.map +1 -0
- package/dist/api/middlewares/validate.d.ts +4 -0
- package/dist/api/middlewares/validate.d.ts.map +1 -0
- package/dist/api/middlewares/validate.js +31 -0
- package/dist/api/middlewares/validate.js.map +1 -0
- package/dist/api/routes/audit.routes.d.ts +5 -0
- package/dist/api/routes/audit.routes.d.ts.map +1 -0
- package/dist/api/routes/audit.routes.js +24 -0
- package/dist/api/routes/audit.routes.js.map +1 -0
- package/dist/api/routes/auth.routes.d.ts +6 -0
- package/dist/api/routes/auth.routes.d.ts.map +1 -0
- package/dist/api/routes/auth.routes.js +22 -0
- package/dist/api/routes/auth.routes.js.map +1 -0
- package/dist/api/routes/export.routes.d.ts +5 -0
- package/dist/api/routes/export.routes.d.ts.map +1 -0
- package/dist/api/routes/export.routes.js +16 -0
- package/dist/api/routes/export.routes.js.map +1 -0
- package/dist/api/routes/health.routes.d.ts +4 -0
- package/dist/api/routes/health.routes.d.ts.map +1 -0
- package/dist/api/routes/health.routes.js +11 -0
- package/dist/api/routes/health.routes.js.map +1 -0
- package/dist/api/routes/index.d.ts +10 -0
- package/dist/api/routes/index.d.ts.map +1 -0
- package/dist/api/routes/index.js +20 -0
- package/dist/api/routes/index.js.map +1 -0
- package/dist/api/routes/providers.routes.d.ts +5 -0
- package/dist/api/routes/providers.routes.d.ts.map +1 -0
- package/dist/api/routes/providers.routes.js +13 -0
- package/dist/api/routes/providers.routes.js.map +1 -0
- package/dist/api/validators/audit.schemas.d.ts +60 -0
- package/dist/api/validators/audit.schemas.d.ts.map +1 -0
- package/dist/api/validators/audit.schemas.js +55 -0
- package/dist/api/validators/audit.schemas.js.map +1 -0
- package/dist/api/validators/auth.schemas.d.ts +17 -0
- package/dist/api/validators/auth.schemas.d.ts.map +1 -0
- package/dist/api/validators/auth.schemas.js +21 -0
- package/dist/api/validators/auth.schemas.js.map +1 -0
- package/dist/app.d.ts +3 -0
- package/dist/app.d.ts.map +1 -0
- package/dist/app.js +62 -0
- package/dist/app.js.map +1 -0
- package/dist/config/config.schema.d.ts +65 -0
- package/dist/config/config.schema.d.ts.map +1 -0
- package/dist/config/config.schema.js +95 -0
- package/dist/config/config.schema.js.map +1 -0
- package/dist/config/index.d.ts +4 -0
- package/dist/config/index.d.ts.map +1 -0
- package/dist/config/index.js +75 -0
- package/dist/config/index.js.map +1 -0
- package/dist/container.d.ts +47 -0
- package/dist/container.d.ts.map +1 -0
- package/dist/container.js +137 -0
- package/dist/container.js.map +1 -0
- package/dist/data/database.d.ts +13 -0
- package/dist/data/database.d.ts.map +1 -0
- package/dist/data/database.js +68 -0
- package/dist/data/database.js.map +1 -0
- package/dist/data/jobs/token-cleanup.job.d.ts +23 -0
- package/dist/data/jobs/token-cleanup.job.d.ts.map +1 -0
- package/dist/data/jobs/token-cleanup.job.js +96 -0
- package/dist/data/jobs/token-cleanup.job.js.map +1 -0
- package/dist/data/migrations/migration.runner.d.ts +13 -0
- package/dist/data/migrations/migration.runner.d.ts.map +1 -0
- package/dist/data/migrations/migration.runner.js +136 -0
- package/dist/data/migrations/migration.runner.js.map +1 -0
- package/dist/data/models/Token.model.d.ts +30 -0
- package/dist/data/models/Token.model.d.ts.map +1 -0
- package/dist/data/models/Token.model.js +3 -0
- package/dist/data/models/Token.model.js.map +1 -0
- package/dist/data/repositories/token.repository.d.ts +16 -0
- package/dist/data/repositories/token.repository.d.ts.map +1 -0
- package/dist/data/repositories/token.repository.js +97 -0
- package/dist/data/repositories/token.repository.js.map +1 -0
- package/dist/providers/azure/auth.provider.d.ts +5 -0
- package/dist/providers/azure/auth.provider.d.ts.map +1 -0
- package/dist/providers/azure/auth.provider.js +13 -0
- package/dist/providers/azure/auth.provider.js.map +1 -0
- package/dist/providers/azure/azure-errors.d.ts +40 -0
- package/dist/providers/azure/azure-errors.d.ts.map +1 -0
- package/dist/providers/azure/azure-errors.js +121 -0
- package/dist/providers/azure/azure-errors.js.map +1 -0
- package/dist/providers/azure/azure-retry.d.ts +41 -0
- package/dist/providers/azure/azure-retry.d.ts.map +1 -0
- package/dist/providers/azure/azure-retry.js +85 -0
- package/dist/providers/azure/azure-retry.js.map +1 -0
- package/dist/providers/azure/graph-client.d.ts +26 -0
- package/dist/providers/azure/graph-client.d.ts.map +1 -0
- package/dist/providers/azure/graph-client.js +146 -0
- package/dist/providers/azure/graph-client.js.map +1 -0
- package/dist/providers/azure/graph.provider.d.ts +23 -0
- package/dist/providers/azure/graph.provider.d.ts.map +1 -0
- package/dist/providers/azure/graph.provider.js +161 -0
- package/dist/providers/azure/graph.provider.js.map +1 -0
- package/dist/providers/azure/queries/app.queries.d.ts +6 -0
- package/dist/providers/azure/queries/app.queries.d.ts.map +1 -0
- package/dist/providers/azure/queries/app.queries.js +9 -0
- package/dist/providers/azure/queries/app.queries.js.map +1 -0
- package/dist/providers/azure/queries/policy.queries.d.ts +6 -0
- package/dist/providers/azure/queries/policy.queries.d.ts.map +1 -0
- package/dist/providers/azure/queries/policy.queries.js +9 -0
- package/dist/providers/azure/queries/policy.queries.js.map +1 -0
- package/dist/providers/azure/queries/user.queries.d.ts +7 -0
- package/dist/providers/azure/queries/user.queries.d.ts.map +1 -0
- package/dist/providers/azure/queries/user.queries.js +10 -0
- package/dist/providers/azure/queries/user.queries.js.map +1 -0
- package/dist/providers/interfaces/IGraphProvider.d.ts +31 -0
- package/dist/providers/interfaces/IGraphProvider.d.ts.map +1 -0
- package/dist/providers/interfaces/IGraphProvider.js +3 -0
- package/dist/providers/interfaces/IGraphProvider.js.map +1 -0
- package/dist/providers/interfaces/ILDAPProvider.d.ts +37 -0
- package/dist/providers/interfaces/ILDAPProvider.d.ts.map +1 -0
- package/dist/providers/interfaces/ILDAPProvider.js +3 -0
- package/dist/providers/interfaces/ILDAPProvider.js.map +1 -0
- package/dist/providers/ldap/acl-parser.d.ts +8 -0
- package/dist/providers/ldap/acl-parser.d.ts.map +1 -0
- package/dist/providers/ldap/acl-parser.js +157 -0
- package/dist/providers/ldap/acl-parser.js.map +1 -0
- package/dist/providers/ldap/ad-mappers.d.ts +8 -0
- package/dist/providers/ldap/ad-mappers.d.ts.map +1 -0
- package/dist/providers/ldap/ad-mappers.js +162 -0
- package/dist/providers/ldap/ad-mappers.js.map +1 -0
- package/dist/providers/ldap/ldap-client.d.ts +33 -0
- package/dist/providers/ldap/ldap-client.d.ts.map +1 -0
- package/dist/providers/ldap/ldap-client.js +195 -0
- package/dist/providers/ldap/ldap-client.js.map +1 -0
- package/dist/providers/ldap/ldap-errors.d.ts +48 -0
- package/dist/providers/ldap/ldap-errors.d.ts.map +1 -0
- package/dist/providers/ldap/ldap-errors.js +120 -0
- package/dist/providers/ldap/ldap-errors.js.map +1 -0
- package/dist/providers/ldap/ldap-retry.d.ts +14 -0
- package/dist/providers/ldap/ldap-retry.d.ts.map +1 -0
- package/dist/providers/ldap/ldap-retry.js +102 -0
- package/dist/providers/ldap/ldap-retry.js.map +1 -0
- package/dist/providers/ldap/ldap-sanitizer.d.ts +12 -0
- package/dist/providers/ldap/ldap-sanitizer.d.ts.map +1 -0
- package/dist/providers/ldap/ldap-sanitizer.js +104 -0
- package/dist/providers/ldap/ldap-sanitizer.js.map +1 -0
- package/dist/providers/ldap/ldap.provider.d.ts +21 -0
- package/dist/providers/ldap/ldap.provider.d.ts.map +1 -0
- package/dist/providers/ldap/ldap.provider.js +165 -0
- package/dist/providers/ldap/ldap.provider.js.map +1 -0
- package/dist/providers/ldap/queries/computer.queries.d.ts +6 -0
- package/dist/providers/ldap/queries/computer.queries.d.ts.map +1 -0
- package/dist/providers/ldap/queries/computer.queries.js +9 -0
- package/dist/providers/ldap/queries/computer.queries.js.map +1 -0
- package/dist/providers/ldap/queries/group.queries.d.ts +6 -0
- package/dist/providers/ldap/queries/group.queries.d.ts.map +1 -0
- package/dist/providers/ldap/queries/group.queries.js +9 -0
- package/dist/providers/ldap/queries/group.queries.js.map +1 -0
- package/dist/providers/ldap/queries/user.queries.d.ts +7 -0
- package/dist/providers/ldap/queries/user.queries.d.ts.map +1 -0
- package/dist/providers/ldap/queries/user.queries.js +10 -0
- package/dist/providers/ldap/queries/user.queries.js.map +1 -0
- package/dist/providers/smb/smb.provider.d.ts +68 -0
- package/dist/providers/smb/smb.provider.d.ts.map +1 -0
- package/dist/providers/smb/smb.provider.js +382 -0
- package/dist/providers/smb/smb.provider.js.map +1 -0
- package/dist/server.d.ts +2 -0
- package/dist/server.d.ts.map +1 -0
- package/dist/server.js +44 -0
- package/dist/server.js.map +1 -0
- package/dist/services/audit/ad-audit.service.d.ts +70 -0
- package/dist/services/audit/ad-audit.service.d.ts.map +1 -0
- package/dist/services/audit/ad-audit.service.js +1019 -0
- package/dist/services/audit/ad-audit.service.js.map +1 -0
- package/dist/services/audit/attack-graph.service.d.ts +62 -0
- package/dist/services/audit/attack-graph.service.d.ts.map +1 -0
- package/dist/services/audit/attack-graph.service.js +702 -0
- package/dist/services/audit/attack-graph.service.js.map +1 -0
- package/dist/services/audit/audit.service.d.ts +4 -0
- package/dist/services/audit/audit.service.d.ts.map +1 -0
- package/dist/services/audit/audit.service.js +10 -0
- package/dist/services/audit/audit.service.js.map +1 -0
- package/dist/services/audit/azure-audit.service.d.ts +37 -0
- package/dist/services/audit/azure-audit.service.d.ts.map +1 -0
- package/dist/services/audit/azure-audit.service.js +153 -0
- package/dist/services/audit/azure-audit.service.js.map +1 -0
- package/dist/services/audit/detectors/ad/accounts.detector.d.ts +37 -0
- package/dist/services/audit/detectors/ad/accounts.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/accounts.detector.js +881 -0
- package/dist/services/audit/detectors/ad/accounts.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/adcs.detector.d.ts +21 -0
- package/dist/services/audit/detectors/ad/adcs.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/adcs.detector.js +227 -0
- package/dist/services/audit/detectors/ad/adcs.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/advanced.detector.d.ts +63 -0
- package/dist/services/audit/detectors/ad/advanced.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/advanced.detector.js +867 -0
- package/dist/services/audit/detectors/ad/advanced.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/attack-paths.detector.d.ts +16 -0
- package/dist/services/audit/detectors/ad/attack-paths.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/attack-paths.detector.js +369 -0
- package/dist/services/audit/detectors/ad/attack-paths.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/compliance.detector.d.ts +28 -0
- package/dist/services/audit/detectors/ad/compliance.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/compliance.detector.js +896 -0
- package/dist/services/audit/detectors/ad/compliance.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/computers.detector.d.ts +30 -0
- package/dist/services/audit/detectors/ad/computers.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/computers.detector.js +799 -0
- package/dist/services/audit/detectors/ad/computers.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/gpo.detector.d.ts +17 -0
- package/dist/services/audit/detectors/ad/gpo.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/gpo.detector.js +257 -0
- package/dist/services/audit/detectors/ad/gpo.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/groups.detector.d.ts +19 -0
- package/dist/services/audit/detectors/ad/groups.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/groups.detector.js +488 -0
- package/dist/services/audit/detectors/ad/groups.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/index.d.ts +15 -0
- package/dist/services/audit/detectors/ad/index.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/index.js +51 -0
- package/dist/services/audit/detectors/ad/index.js.map +1 -0
- package/dist/services/audit/detectors/ad/kerberos.detector.d.ts +17 -0
- package/dist/services/audit/detectors/ad/kerberos.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/kerberos.detector.js +293 -0
- package/dist/services/audit/detectors/ad/kerberos.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/monitoring.detector.d.ts +23 -0
- package/dist/services/audit/detectors/ad/monitoring.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/monitoring.detector.js +328 -0
- package/dist/services/audit/detectors/ad/monitoring.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/network.detector.d.ts +39 -0
- package/dist/services/audit/detectors/ad/network.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/network.detector.js +257 -0
- package/dist/services/audit/detectors/ad/network.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/password.detector.d.ts +14 -0
- package/dist/services/audit/detectors/ad/password.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/password.detector.js +235 -0
- package/dist/services/audit/detectors/ad/password.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/permissions.detector.d.ts +20 -0
- package/dist/services/audit/detectors/ad/permissions.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/permissions.detector.js +392 -0
- package/dist/services/audit/detectors/ad/permissions.detector.js.map +1 -0
- package/dist/services/audit/detectors/ad/trusts.detector.d.ts +11 -0
- package/dist/services/audit/detectors/ad/trusts.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/ad/trusts.detector.js +186 -0
- package/dist/services/audit/detectors/ad/trusts.detector.js.map +1 -0
- package/dist/services/audit/detectors/azure/app-security.detector.d.ts +11 -0
- package/dist/services/audit/detectors/azure/app-security.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/azure/app-security.detector.js +184 -0
- package/dist/services/audit/detectors/azure/app-security.detector.js.map +1 -0
- package/dist/services/audit/detectors/azure/conditional-access.detector.d.ts +10 -0
- package/dist/services/audit/detectors/azure/conditional-access.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/azure/conditional-access.detector.js +130 -0
- package/dist/services/audit/detectors/azure/conditional-access.detector.js.map +1 -0
- package/dist/services/audit/detectors/azure/privilege-security.detector.d.ts +8 -0
- package/dist/services/audit/detectors/azure/privilege-security.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/azure/privilege-security.detector.js +113 -0
- package/dist/services/audit/detectors/azure/privilege-security.detector.js.map +1 -0
- package/dist/services/audit/detectors/azure/user-security.detector.d.ts +14 -0
- package/dist/services/audit/detectors/azure/user-security.detector.d.ts.map +1 -0
- package/dist/services/audit/detectors/azure/user-security.detector.js +198 -0
- package/dist/services/audit/detectors/azure/user-security.detector.js.map +1 -0
- package/dist/services/audit/detectors/index.d.ts +2 -0
- package/dist/services/audit/detectors/index.d.ts.map +1 -0
- package/dist/services/audit/detectors/index.js +38 -0
- package/dist/services/audit/detectors/index.js.map +1 -0
- package/dist/services/audit/response-formatter.d.ts +176 -0
- package/dist/services/audit/response-formatter.d.ts.map +1 -0
- package/dist/services/audit/response-formatter.js +240 -0
- package/dist/services/audit/response-formatter.js.map +1 -0
- package/dist/services/audit/scoring.service.d.ts +15 -0
- package/dist/services/audit/scoring.service.d.ts.map +1 -0
- package/dist/services/audit/scoring.service.js +139 -0
- package/dist/services/audit/scoring.service.js.map +1 -0
- package/dist/services/auth/crypto.service.d.ts +19 -0
- package/dist/services/auth/crypto.service.d.ts.map +1 -0
- package/dist/services/auth/crypto.service.js +135 -0
- package/dist/services/auth/crypto.service.js.map +1 -0
- package/dist/services/auth/errors.d.ts +19 -0
- package/dist/services/auth/errors.d.ts.map +1 -0
- package/dist/services/auth/errors.js +46 -0
- package/dist/services/auth/errors.js.map +1 -0
- package/dist/services/auth/token.service.d.ts +41 -0
- package/dist/services/auth/token.service.d.ts.map +1 -0
- package/dist/services/auth/token.service.js +208 -0
- package/dist/services/auth/token.service.js.map +1 -0
- package/dist/services/config/config.service.d.ts +6 -0
- package/dist/services/config/config.service.d.ts.map +1 -0
- package/dist/services/config/config.service.js +64 -0
- package/dist/services/config/config.service.js.map +1 -0
- package/dist/services/export/export.service.d.ts +28 -0
- package/dist/services/export/export.service.d.ts.map +1 -0
- package/dist/services/export/export.service.js +28 -0
- package/dist/services/export/export.service.js.map +1 -0
- package/dist/services/export/formatters/csv.formatter.d.ts +8 -0
- package/dist/services/export/formatters/csv.formatter.d.ts.map +1 -0
- package/dist/services/export/formatters/csv.formatter.js +46 -0
- package/dist/services/export/formatters/csv.formatter.js.map +1 -0
- package/dist/services/export/formatters/json.formatter.d.ts +40 -0
- package/dist/services/export/formatters/json.formatter.d.ts.map +1 -0
- package/dist/services/export/formatters/json.formatter.js +58 -0
- package/dist/services/export/formatters/json.formatter.js.map +1 -0
- package/dist/services/jobs/azure-job-runner.d.ts +38 -0
- package/dist/services/jobs/azure-job-runner.d.ts.map +1 -0
- package/dist/services/jobs/azure-job-runner.js +199 -0
- package/dist/services/jobs/azure-job-runner.js.map +1 -0
- package/dist/services/jobs/index.d.ts +4 -0
- package/dist/services/jobs/index.d.ts.map +1 -0
- package/dist/services/jobs/index.js +20 -0
- package/dist/services/jobs/index.js.map +1 -0
- package/dist/services/jobs/job-runner.d.ts +64 -0
- package/dist/services/jobs/job-runner.d.ts.map +1 -0
- package/dist/services/jobs/job-runner.js +952 -0
- package/dist/services/jobs/job-runner.js.map +1 -0
- package/dist/services/jobs/job-store.d.ts +27 -0
- package/dist/services/jobs/job-store.d.ts.map +1 -0
- package/dist/services/jobs/job-store.js +261 -0
- package/dist/services/jobs/job-store.js.map +1 -0
- package/dist/services/jobs/job.types.d.ts +67 -0
- package/dist/services/jobs/job.types.d.ts.map +1 -0
- package/dist/services/jobs/job.types.js +36 -0
- package/dist/services/jobs/job.types.js.map +1 -0
- package/dist/types/ad.types.d.ts +74 -0
- package/dist/types/ad.types.d.ts.map +1 -0
- package/dist/types/ad.types.js +3 -0
- package/dist/types/ad.types.js.map +1 -0
- package/dist/types/adcs.types.d.ts +58 -0
- package/dist/types/adcs.types.d.ts.map +1 -0
- package/dist/types/adcs.types.js +38 -0
- package/dist/types/adcs.types.js.map +1 -0
- package/dist/types/attack-graph.types.d.ts +135 -0
- package/dist/types/attack-graph.types.d.ts.map +1 -0
- package/dist/types/attack-graph.types.js +58 -0
- package/dist/types/attack-graph.types.js.map +1 -0
- package/dist/types/audit.types.d.ts +34 -0
- package/dist/types/audit.types.d.ts.map +1 -0
- package/dist/types/audit.types.js +3 -0
- package/dist/types/audit.types.js.map +1 -0
- package/dist/types/azure.types.d.ts +61 -0
- package/dist/types/azure.types.d.ts.map +1 -0
- package/dist/types/azure.types.js +3 -0
- package/dist/types/azure.types.js.map +1 -0
- package/dist/types/config.types.d.ts +63 -0
- package/dist/types/config.types.d.ts.map +1 -0
- package/dist/types/config.types.js +3 -0
- package/dist/types/config.types.js.map +1 -0
- package/dist/types/error.types.d.ts +33 -0
- package/dist/types/error.types.d.ts.map +1 -0
- package/dist/types/error.types.js +70 -0
- package/dist/types/error.types.js.map +1 -0
- package/dist/types/finding.types.d.ts +133 -0
- package/dist/types/finding.types.d.ts.map +1 -0
- package/dist/types/finding.types.js +3 -0
- package/dist/types/finding.types.js.map +1 -0
- package/dist/types/gpo.types.d.ts +39 -0
- package/dist/types/gpo.types.d.ts.map +1 -0
- package/dist/types/gpo.types.js +15 -0
- package/dist/types/gpo.types.js.map +1 -0
- package/dist/types/token.types.d.ts +26 -0
- package/dist/types/token.types.d.ts.map +1 -0
- package/dist/types/token.types.js +3 -0
- package/dist/types/token.types.js.map +1 -0
- package/dist/types/trust.types.d.ts +45 -0
- package/dist/types/trust.types.d.ts.map +1 -0
- package/dist/types/trust.types.js +71 -0
- package/dist/types/trust.types.js.map +1 -0
- package/dist/utils/entity-converter.d.ts +17 -0
- package/dist/utils/entity-converter.d.ts.map +1 -0
- package/dist/utils/entity-converter.js +285 -0
- package/dist/utils/entity-converter.js.map +1 -0
- package/dist/utils/graph.util.d.ts +66 -0
- package/dist/utils/graph.util.d.ts.map +1 -0
- package/dist/utils/graph.util.js +382 -0
- package/dist/utils/graph.util.js.map +1 -0
- package/dist/utils/logger.d.ts +7 -0
- package/dist/utils/logger.d.ts.map +1 -0
- package/dist/utils/logger.js +86 -0
- package/dist/utils/logger.js.map +1 -0
- package/dist/utils/type-name-normalizer.d.ts +5 -0
- package/dist/utils/type-name-normalizer.d.ts.map +1 -0
- package/dist/utils/type-name-normalizer.js +218 -0
- package/dist/utils/type-name-normalizer.js.map +1 -0
- package/docker-compose.yml +26 -0
- package/docs/api/README.md +178 -0
- package/docs/api/openapi.yaml +1524 -0
- package/eslint.config.js +54 -0
- package/jest.config.js +38 -0
- package/package.json +97 -0
- package/scripts/fetch-ad-cert.sh +142 -0
- package/src/.gitkeep +0 -0
- package/src/api/.gitkeep +0 -0
- package/src/api/controllers/.gitkeep +0 -0
- package/src/api/controllers/audit.controller.ts +313 -0
- package/src/api/controllers/auth.controller.ts +258 -0
- package/src/api/controllers/export.controller.ts +153 -0
- package/src/api/controllers/health.controller.ts +16 -0
- package/src/api/controllers/jobs.controller.ts +187 -0
- package/src/api/controllers/providers.controller.ts +165 -0
- package/src/api/dto/.gitkeep +0 -0
- package/src/api/dto/AuditRequest.dto.ts +8 -0
- package/src/api/dto/AuditResponse.dto.ts +19 -0
- package/src/api/dto/TokenRequest.dto.ts +8 -0
- package/src/api/dto/TokenResponse.dto.ts +14 -0
- package/src/api/middlewares/.gitkeep +0 -0
- package/src/api/middlewares/authenticate.ts +203 -0
- package/src/api/middlewares/errorHandler.ts +54 -0
- package/src/api/middlewares/rateLimit.ts +35 -0
- package/src/api/middlewares/validate.ts +32 -0
- package/src/api/routes/.gitkeep +0 -0
- package/src/api/routes/audit.routes.ts +77 -0
- package/src/api/routes/auth.routes.ts +71 -0
- package/src/api/routes/export.routes.ts +34 -0
- package/src/api/routes/health.routes.ts +14 -0
- package/src/api/routes/index.ts +40 -0
- package/src/api/routes/providers.routes.ts +24 -0
- package/src/api/validators/.gitkeep +0 -0
- package/src/api/validators/audit.schemas.ts +59 -0
- package/src/api/validators/auth.schemas.ts +59 -0
- package/src/app.ts +87 -0
- package/src/config/.gitkeep +0 -0
- package/src/config/config.schema.ts +108 -0
- package/src/config/index.ts +82 -0
- package/src/container.ts +221 -0
- package/src/data/.gitkeep +0 -0
- package/src/data/database.ts +78 -0
- package/src/data/jobs/token-cleanup.job.ts +166 -0
- package/src/data/migrations/.gitkeep +0 -0
- package/src/data/migrations/001_initial_schema.sql +47 -0
- package/src/data/migrations/migration.runner.ts +125 -0
- package/src/data/models/.gitkeep +0 -0
- package/src/data/models/Token.model.ts +35 -0
- package/src/data/repositories/.gitkeep +0 -0
- package/src/data/repositories/token.repository.ts +160 -0
- package/src/providers/.gitkeep +0 -0
- package/src/providers/azure/.gitkeep +0 -0
- package/src/providers/azure/auth.provider.ts +14 -0
- package/src/providers/azure/azure-errors.ts +189 -0
- package/src/providers/azure/azure-retry.ts +168 -0
- package/src/providers/azure/graph-client.ts +315 -0
- package/src/providers/azure/graph.provider.ts +294 -0
- package/src/providers/azure/queries/app.queries.ts +9 -0
- package/src/providers/azure/queries/policy.queries.ts +9 -0
- package/src/providers/azure/queries/user.queries.ts +10 -0
- package/src/providers/interfaces/.gitkeep +0 -0
- package/src/providers/interfaces/IGraphProvider.ts +117 -0
- package/src/providers/interfaces/ILDAPProvider.ts +142 -0
- package/src/providers/ldap/.gitkeep +0 -0
- package/src/providers/ldap/acl-parser.ts +231 -0
- package/src/providers/ldap/ad-mappers.ts +280 -0
- package/src/providers/ldap/ldap-client.ts +259 -0
- package/src/providers/ldap/ldap-errors.ts +188 -0
- package/src/providers/ldap/ldap-retry.ts +267 -0
- package/src/providers/ldap/ldap-sanitizer.ts +273 -0
- package/src/providers/ldap/ldap.provider.ts +293 -0
- package/src/providers/ldap/queries/computer.queries.ts +9 -0
- package/src/providers/ldap/queries/group.queries.ts +9 -0
- package/src/providers/ldap/queries/user.queries.ts +10 -0
- package/src/providers/smb/smb.provider.ts +653 -0
- package/src/server.ts +60 -0
- package/src/services/.gitkeep +0 -0
- package/src/services/audit/.gitkeep +0 -0
- package/src/services/audit/ad-audit.service.ts +1481 -0
- package/src/services/audit/attack-graph.service.ts +1104 -0
- package/src/services/audit/audit.service.ts +12 -0
- package/src/services/audit/azure-audit.service.ts +286 -0
- package/src/services/audit/detectors/ad/accounts.detector.ts +1232 -0
- package/src/services/audit/detectors/ad/adcs.detector.ts +449 -0
- package/src/services/audit/detectors/ad/advanced.detector.ts +1270 -0
- package/src/services/audit/detectors/ad/attack-paths.detector.ts +600 -0
- package/src/services/audit/detectors/ad/compliance.detector.ts +1421 -0
- package/src/services/audit/detectors/ad/computers.detector.ts +1188 -0
- package/src/services/audit/detectors/ad/gpo.detector.ts +485 -0
- package/src/services/audit/detectors/ad/groups.detector.ts +685 -0
- package/src/services/audit/detectors/ad/index.ts +84 -0
- package/src/services/audit/detectors/ad/kerberos.detector.ts +424 -0
- package/src/services/audit/detectors/ad/monitoring.detector.ts +501 -0
- package/src/services/audit/detectors/ad/network.detector.ts +538 -0
- package/src/services/audit/detectors/ad/password.detector.ts +324 -0
- package/src/services/audit/detectors/ad/permissions.detector.ts +637 -0
- package/src/services/audit/detectors/ad/trusts.detector.ts +315 -0
- package/src/services/audit/detectors/azure/app-security.detector.ts +246 -0
- package/src/services/audit/detectors/azure/conditional-access.detector.ts +186 -0
- package/src/services/audit/detectors/azure/privilege-security.detector.ts +176 -0
- package/src/services/audit/detectors/azure/user-security.detector.ts +280 -0
- package/src/services/audit/detectors/index.ts +18 -0
- package/src/services/audit/response-formatter.ts +604 -0
- package/src/services/audit/scoring.service.ts +234 -0
- package/src/services/auth/.gitkeep +0 -0
- package/src/services/auth/crypto.service.ts +230 -0
- package/src/services/auth/errors.ts +47 -0
- package/src/services/auth/token.service.ts +420 -0
- package/src/services/config/.gitkeep +0 -0
- package/src/services/config/config.service.ts +75 -0
- package/src/services/export/.gitkeep +0 -0
- package/src/services/export/export.service.ts +99 -0
- package/src/services/export/formatters/csv.formatter.ts +124 -0
- package/src/services/export/formatters/json.formatter.ts +160 -0
- package/src/services/jobs/azure-job-runner.ts +312 -0
- package/src/services/jobs/index.ts +9 -0
- package/src/services/jobs/job-runner.ts +1280 -0
- package/src/services/jobs/job-store.ts +384 -0
- package/src/services/jobs/job.types.ts +182 -0
- package/src/types/.gitkeep +0 -0
- package/src/types/ad.types.ts +91 -0
- package/src/types/adcs.types.ts +107 -0
- package/src/types/attack-graph.types.ts +260 -0
- package/src/types/audit.types.ts +42 -0
- package/src/types/azure.types.ts +68 -0
- package/src/types/config.types.ts +79 -0
- package/src/types/error.types.ts +69 -0
- package/src/types/finding.types.ts +284 -0
- package/src/types/gpo.types.ts +72 -0
- package/src/types/smb2.d.ts +73 -0
- package/src/types/token.types.ts +32 -0
- package/src/types/trust.types.ts +140 -0
- package/src/utils/.gitkeep +0 -0
- package/src/utils/entity-converter.ts +453 -0
- package/src/utils/graph.util.ts +609 -0
- package/src/utils/logger.ts +111 -0
- package/src/utils/type-name-normalizer.ts +302 -0
- package/tests/.gitkeep +0 -0
- package/tests/e2e/.gitkeep +0 -0
- package/tests/fixtures/.gitkeep +0 -0
- package/tests/integration/.gitkeep +0 -0
- package/tests/integration/README.md +156 -0
- package/tests/integration/ad-audit.integration.test.ts +216 -0
- package/tests/integration/api/.gitkeep +0 -0
- package/tests/integration/api/endpoints.integration.test.ts +431 -0
- package/tests/integration/auth/jwt-authentication.integration.test.ts +358 -0
- package/tests/integration/providers/.gitkeep +0 -0
- package/tests/integration/providers/azure-basic.integration.test.ts +167 -0
- package/tests/integration/providers/ldap-basic.integration.test.ts +152 -0
- package/tests/integration/providers/ldap-connectivity.test.ts +44 -0
- package/tests/integration/providers/ldap-provider.integration.test.ts +347 -0
- package/tests/mocks/.gitkeep +0 -0
- package/tests/setup.ts +16 -0
- package/tests/unit/.gitkeep +0 -0
- package/tests/unit/api/middlewares/authenticate.test.ts +446 -0
- package/tests/unit/providers/.gitkeep +0 -0
- package/tests/unit/providers/azure/azure-errors.test.ts +193 -0
- package/tests/unit/providers/azure/azure-retry.test.ts +254 -0
- package/tests/unit/providers/azure/graph-provider.test.ts +313 -0
- package/tests/unit/providers/ldap/ad-mappers.test.ts +392 -0
- package/tests/unit/providers/ldap/ldap-provider.test.ts +376 -0
- package/tests/unit/providers/ldap/ldap-retry.test.ts +377 -0
- package/tests/unit/providers/ldap/ldap-sanitizer.test.ts +301 -0
- package/tests/unit/sample.test.ts +19 -0
- package/tests/unit/services/.gitkeep +0 -0
- package/tests/unit/services/audit/detectors/ad/accounts.detector.test.ts +393 -0
- package/tests/unit/services/audit/detectors/ad/advanced.detector.test.ts +380 -0
- package/tests/unit/services/audit/detectors/ad/computers.detector.test.ts +440 -0
- package/tests/unit/services/audit/detectors/ad/groups.detector.test.ts +276 -0
- package/tests/unit/services/audit/detectors/ad/kerberos.detector.test.ts +215 -0
- package/tests/unit/services/audit/detectors/ad/password.detector.test.ts +226 -0
- package/tests/unit/services/audit/detectors/ad/permissions.detector.test.ts +244 -0
- package/tests/unit/services/audit/detectors/azure/app-security.detector.test.ts +349 -0
- package/tests/unit/services/audit/detectors/azure/conditional-access.detector.test.ts +374 -0
- package/tests/unit/services/audit/detectors/azure/privilege-security.detector.test.ts +374 -0
- package/tests/unit/services/audit/detectors/azure/user-security.detector.test.ts +297 -0
- package/tests/unit/services/auth/crypto.service.test.ts +296 -0
- package/tests/unit/services/auth/token.service.test.ts +579 -0
- package/tests/unit/services/export/export.service.test.ts +241 -0
- package/tests/unit/services/export/formatters/csv.formatter.test.ts +270 -0
- package/tests/unit/services/export/formatters/json.formatter.test.ts +258 -0
- package/tests/unit/utils/.gitkeep +0 -0
- package/tsconfig.json +50 -0
|
@@ -0,0 +1,1019 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.ADAuditService = void 0;
|
|
4
|
+
const acl_parser_1 = require("../../providers/ldap/acl-parser");
|
|
5
|
+
const scoring_service_1 = require("./scoring.service");
|
|
6
|
+
const logger_1 = require("../../utils/logger");
|
|
7
|
+
const smb_provider_1 = require("../../providers/smb/smb.provider");
|
|
8
|
+
const ldapts_1 = require("ldapts");
|
|
9
|
+
const ad_1 = require("./detectors/ad");
|
|
10
|
+
const trust_types_1 = require("../../types/trust.types");
|
|
11
|
+
const attack_graph_service_1 = require("./attack-graph.service");
|
|
12
|
+
function createSDFlagsControl() {
|
|
13
|
+
const LDAP_SERVER_SD_FLAGS_OID = '1.2.840.113556.1.4.801';
|
|
14
|
+
const SD_FLAGS = 0x00000007;
|
|
15
|
+
const buffer = Buffer.from([0x02, 0x01, SD_FLAGS]);
|
|
16
|
+
return {
|
|
17
|
+
oid: LDAP_SERVER_SD_FLAGS_OID,
|
|
18
|
+
critical: false,
|
|
19
|
+
value: buffer,
|
|
20
|
+
};
|
|
21
|
+
}
|
|
22
|
+
function convertFiletimeToDate(filetime) {
|
|
23
|
+
if (!filetime)
|
|
24
|
+
return undefined;
|
|
25
|
+
let filetimeNum;
|
|
26
|
+
if (typeof filetime === 'string') {
|
|
27
|
+
filetimeNum = parseInt(filetime, 10);
|
|
28
|
+
}
|
|
29
|
+
else if (typeof filetime === 'number') {
|
|
30
|
+
filetimeNum = filetime;
|
|
31
|
+
}
|
|
32
|
+
else {
|
|
33
|
+
return undefined;
|
|
34
|
+
}
|
|
35
|
+
if (filetimeNum === 0 || filetimeNum >= 9223372036854775807) {
|
|
36
|
+
return undefined;
|
|
37
|
+
}
|
|
38
|
+
const milliseconds = filetimeNum / 10000;
|
|
39
|
+
const epochOffset = 11644473600000;
|
|
40
|
+
const unixTimestamp = milliseconds - epochOffset;
|
|
41
|
+
if (unixTimestamp < 0 || unixTimestamp > Date.now() + 100 * 365 * 24 * 60 * 60 * 1000) {
|
|
42
|
+
return undefined;
|
|
43
|
+
}
|
|
44
|
+
return new Date(unixTimestamp);
|
|
45
|
+
}
|
|
46
|
+
class ADAuditService {
|
|
47
|
+
ldapProvider;
|
|
48
|
+
smbConfig;
|
|
49
|
+
constructor(ldapProvider, smbConfig) {
|
|
50
|
+
this.ldapProvider = ldapProvider;
|
|
51
|
+
this.smbConfig = smbConfig;
|
|
52
|
+
}
|
|
53
|
+
async runAudit(options = {}) {
|
|
54
|
+
const startTime = Date.now();
|
|
55
|
+
const { includeDetails = false, maxUsers, maxGroups, maxComputers } = options;
|
|
56
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
57
|
+
const [users, groups, computers, domain, ouCount] = await Promise.all([
|
|
58
|
+
this.fetchUsers(maxUsers),
|
|
59
|
+
this.fetchGroups(maxGroups),
|
|
60
|
+
this.fetchComputers(maxComputers),
|
|
61
|
+
this.fetchDomain(),
|
|
62
|
+
this.fetchOUCount(),
|
|
63
|
+
]);
|
|
64
|
+
const [certTemplates, certAuthorities, gpoData, trustsExtended, aclEntries, anonymousAccessAllowed, gpoSecuritySettings] = await Promise.all([
|
|
65
|
+
this.fetchCertificateTemplates(),
|
|
66
|
+
this.fetchCertificateAuthorities(),
|
|
67
|
+
this.fetchGPOsWithAcls(),
|
|
68
|
+
this.fetchTrustsExtended(),
|
|
69
|
+
this.fetchAcls(users, groups, computers),
|
|
70
|
+
this.testAnonymousLdapAccess(),
|
|
71
|
+
this.fetchGpoSecuritySettings(),
|
|
72
|
+
]);
|
|
73
|
+
const templates = certTemplates;
|
|
74
|
+
const cas = certAuthorities;
|
|
75
|
+
const fsps = [];
|
|
76
|
+
const findings = [];
|
|
77
|
+
const detectorResults = await Promise.all([
|
|
78
|
+
Promise.resolve((0, ad_1.detectPasswordVulnerabilities)(users, includeDetails)),
|
|
79
|
+
Promise.resolve((0, ad_1.detectKerberosVulnerabilities)(users, includeDetails)),
|
|
80
|
+
Promise.resolve((0, ad_1.detectAccountsVulnerabilities)(users, includeDetails)),
|
|
81
|
+
Promise.resolve((0, ad_1.detectGroupsVulnerabilities)(users, groups, includeDetails)),
|
|
82
|
+
Promise.resolve((0, ad_1.detectComputersVulnerabilities)(computers, includeDetails)),
|
|
83
|
+
Promise.resolve((0, ad_1.detectAdvancedVulnerabilities)(users, computers, domain, templates, cas, fsps, includeDetails, {
|
|
84
|
+
gpoSettings: gpoSecuritySettings,
|
|
85
|
+
anonymousAccessAllowed,
|
|
86
|
+
})),
|
|
87
|
+
Promise.resolve((0, ad_1.detectPermissionsVulnerabilities)(aclEntries, includeDetails, computers.map((c) => c.dn))),
|
|
88
|
+
Promise.resolve((0, ad_1.detectAdcsVulnerabilities)(certTemplates, certAuthorities, includeDetails)),
|
|
89
|
+
Promise.resolve((0, ad_1.detectGpoVulnerabilities)(gpoData.gpos, gpoData.links, domain ? { minPasswordLength: domain['minPwdLength'] } : null, includeDetails, gpoData.gpoAcls)),
|
|
90
|
+
Promise.resolve((0, ad_1.detectTrustVulnerabilities)(trustsExtended, includeDetails)),
|
|
91
|
+
Promise.resolve((0, ad_1.detectAttackPathVulnerabilities)(users, groups, computers, aclEntries, gpoData.gpos, trustsExtended, certTemplates, includeDetails)),
|
|
92
|
+
Promise.resolve((0, ad_1.detectMonitoringVulnerabilities)(users, groups, domain, includeDetails, {
|
|
93
|
+
gpoSettings: gpoSecuritySettings,
|
|
94
|
+
})),
|
|
95
|
+
]);
|
|
96
|
+
detectorResults.forEach((categoryFindings) => {
|
|
97
|
+
findings.push(...categoryFindings);
|
|
98
|
+
});
|
|
99
|
+
const score = (0, scoring_service_1.calculateSecurityScore)(findings, users.length);
|
|
100
|
+
const domainConfig = await this.fetchDomainConfig(domain);
|
|
101
|
+
logger_1.logger.info('Computing attack graph...');
|
|
102
|
+
const attackGraphStartTime = Date.now();
|
|
103
|
+
const attackGraph = (0, attack_graph_service_1.computeAttackGraph)(users, groups, computers, aclEntries, certTemplates, gpoData.gpos, {
|
|
104
|
+
name: domainConfig?.domainInfo?.domainName || this.extractDomainNameFromDN(baseDN),
|
|
105
|
+
sid: undefined,
|
|
106
|
+
}, 500);
|
|
107
|
+
logger_1.logger.info(`Attack graph computed in ${Date.now() - attackGraphStartTime}ms: ${attackGraph.paths.length} paths found`);
|
|
108
|
+
const executionTimeMs = Date.now() - startTime;
|
|
109
|
+
const disabledUsers = users.filter((u) => ((u.userAccountControl ?? 0) & 0x2) !== 0).length;
|
|
110
|
+
const enabledUsers = users.length - disabledUsers;
|
|
111
|
+
const disabledComputers = computers.filter((c) => !c.enabled).length;
|
|
112
|
+
const enabledComputers = computers.length - disabledComputers;
|
|
113
|
+
return {
|
|
114
|
+
score,
|
|
115
|
+
findings,
|
|
116
|
+
stats: {
|
|
117
|
+
totalUsers: users.length,
|
|
118
|
+
enabledUsers,
|
|
119
|
+
disabledUsers,
|
|
120
|
+
totalGroups: groups.length,
|
|
121
|
+
totalComputers: computers.length,
|
|
122
|
+
enabledComputers,
|
|
123
|
+
disabledComputers,
|
|
124
|
+
totalOUs: ouCount,
|
|
125
|
+
totalFindings: findings.length,
|
|
126
|
+
executionTimeMs,
|
|
127
|
+
ldapUrl: this.ldapProvider.getUrl(),
|
|
128
|
+
},
|
|
129
|
+
timestamp: new Date(),
|
|
130
|
+
domainConfig,
|
|
131
|
+
attackGraph,
|
|
132
|
+
};
|
|
133
|
+
}
|
|
134
|
+
async testConnection() {
|
|
135
|
+
try {
|
|
136
|
+
return await this.ldapProvider.testConnection();
|
|
137
|
+
}
|
|
138
|
+
catch (error) {
|
|
139
|
+
return {
|
|
140
|
+
success: false,
|
|
141
|
+
message: error instanceof Error ? error.message : 'Unknown connection error',
|
|
142
|
+
};
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
async testAnonymousLdapAccess() {
|
|
146
|
+
if (!this.smbConfig?.ldap) {
|
|
147
|
+
return false;
|
|
148
|
+
}
|
|
149
|
+
const { ldap } = this.smbConfig;
|
|
150
|
+
const urlMatch = ldap.url.match(/ldaps?:\/\/([^:/]+)(?::(\d+))?/i);
|
|
151
|
+
if (!urlMatch || !urlMatch[1]) {
|
|
152
|
+
return false;
|
|
153
|
+
}
|
|
154
|
+
const host = urlMatch[1];
|
|
155
|
+
const isLdaps = ldap.url.toLowerCase().startsWith('ldaps://');
|
|
156
|
+
const defaultPort = isLdaps ? 636 : 389;
|
|
157
|
+
const port = urlMatch[2] ? parseInt(urlMatch[2], 10) : defaultPort;
|
|
158
|
+
try {
|
|
159
|
+
const anonClient = new ldapts_1.Client({
|
|
160
|
+
url: `ldap://${host}:${port}`,
|
|
161
|
+
timeout: 5000,
|
|
162
|
+
connectTimeout: 5000,
|
|
163
|
+
});
|
|
164
|
+
await anonClient.bind('', '');
|
|
165
|
+
try {
|
|
166
|
+
await anonClient.search(ldap.baseDN, {
|
|
167
|
+
filter: '(objectClass=domain)',
|
|
168
|
+
attributes: ['dn'],
|
|
169
|
+
scope: 'base',
|
|
170
|
+
sizeLimit: 1,
|
|
171
|
+
});
|
|
172
|
+
}
|
|
173
|
+
catch {
|
|
174
|
+
}
|
|
175
|
+
await anonClient.unbind();
|
|
176
|
+
return true;
|
|
177
|
+
}
|
|
178
|
+
catch {
|
|
179
|
+
return false;
|
|
180
|
+
}
|
|
181
|
+
}
|
|
182
|
+
async fetchUsers(maxUsers) {
|
|
183
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
184
|
+
const filter = '(&(objectClass=user)(objectCategory=person))';
|
|
185
|
+
const attributes = [
|
|
186
|
+
'dn',
|
|
187
|
+
'sAMAccountName',
|
|
188
|
+
'userPrincipalName',
|
|
189
|
+
'displayName',
|
|
190
|
+
'mail',
|
|
191
|
+
'title',
|
|
192
|
+
'department',
|
|
193
|
+
'company',
|
|
194
|
+
'manager',
|
|
195
|
+
'physicalDeliveryOfficeName',
|
|
196
|
+
'description',
|
|
197
|
+
'employeeID',
|
|
198
|
+
'telephoneNumber',
|
|
199
|
+
'whenCreated',
|
|
200
|
+
'whenChanged',
|
|
201
|
+
'lastLogon',
|
|
202
|
+
'pwdLastSet',
|
|
203
|
+
'passwordLastSet',
|
|
204
|
+
'accountExpires',
|
|
205
|
+
'badPwdCount',
|
|
206
|
+
'lockoutTime',
|
|
207
|
+
'adminCount',
|
|
208
|
+
'memberOf',
|
|
209
|
+
'userAccountControl',
|
|
210
|
+
'servicePrincipalName',
|
|
211
|
+
'msDS-SupportedEncryptionTypes',
|
|
212
|
+
'sIDHistory',
|
|
213
|
+
'msDS-KeyCredentialLink',
|
|
214
|
+
'msDS-AllowedToActOnBehalfOfOtherIdentity',
|
|
215
|
+
'msDS-AllowedToDelegateTo',
|
|
216
|
+
'unixUserPassword',
|
|
217
|
+
'userPassword',
|
|
218
|
+
];
|
|
219
|
+
const results = await this.ldapProvider.search(baseDN, {
|
|
220
|
+
filter,
|
|
221
|
+
attributes,
|
|
222
|
+
scope: 'sub',
|
|
223
|
+
sizeLimit: maxUsers,
|
|
224
|
+
paged: true,
|
|
225
|
+
});
|
|
226
|
+
return results.map((entry) => ({
|
|
227
|
+
...entry,
|
|
228
|
+
dn: entry.dn,
|
|
229
|
+
sAMAccountName: entry.sAMAccountName,
|
|
230
|
+
userPrincipalName: entry.userPrincipalName,
|
|
231
|
+
displayName: entry.displayName,
|
|
232
|
+
enabled: !(entry.userAccountControl & 0x2),
|
|
233
|
+
passwordLastSet: convertFiletimeToDate(entry.passwordLastSet),
|
|
234
|
+
lastLogon: convertFiletimeToDate(entry.lastLogon),
|
|
235
|
+
accountExpires: convertFiletimeToDate(entry.accountExpires),
|
|
236
|
+
adminCount: entry.adminCount,
|
|
237
|
+
memberOf: !entry.memberOf ? [] : Array.isArray(entry.memberOf) ? entry.memberOf : [entry.memberOf],
|
|
238
|
+
servicePrincipalName: !entry.servicePrincipalName
|
|
239
|
+
? []
|
|
240
|
+
: Array.isArray(entry.servicePrincipalName)
|
|
241
|
+
? entry.servicePrincipalName
|
|
242
|
+
: [entry.servicePrincipalName],
|
|
243
|
+
userAccountControl: entry.userAccountControl,
|
|
244
|
+
}));
|
|
245
|
+
}
|
|
246
|
+
async fetchGroups(maxGroups) {
|
|
247
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
248
|
+
const filter = '(objectClass=group)';
|
|
249
|
+
const attributes = ['dn', 'sAMAccountName', 'displayName', 'groupType', 'memberOf', 'member'];
|
|
250
|
+
const results = await this.ldapProvider.search(baseDN, {
|
|
251
|
+
filter,
|
|
252
|
+
attributes,
|
|
253
|
+
scope: 'sub',
|
|
254
|
+
sizeLimit: maxGroups,
|
|
255
|
+
paged: true,
|
|
256
|
+
});
|
|
257
|
+
return results.map((entry) => ({
|
|
258
|
+
...entry,
|
|
259
|
+
dn: entry.dn,
|
|
260
|
+
sAMAccountName: entry.sAMAccountName,
|
|
261
|
+
displayName: entry.displayName,
|
|
262
|
+
groupType: entry.groupType,
|
|
263
|
+
memberOf: !entry.memberOf ? [] : Array.isArray(entry.memberOf) ? entry.memberOf : [entry.memberOf],
|
|
264
|
+
member: !entry.member ? [] : Array.isArray(entry.member) ? entry.member : [entry.member],
|
|
265
|
+
}));
|
|
266
|
+
}
|
|
267
|
+
async fetchComputers(maxComputers) {
|
|
268
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
269
|
+
const filter = '(objectClass=computer)';
|
|
270
|
+
const attributes = [
|
|
271
|
+
'dn',
|
|
272
|
+
'sAMAccountName',
|
|
273
|
+
'dNSHostName',
|
|
274
|
+
'operatingSystem',
|
|
275
|
+
'operatingSystemVersion',
|
|
276
|
+
'lastLogon',
|
|
277
|
+
'userAccountControl',
|
|
278
|
+
'pwdLastSet',
|
|
279
|
+
'servicePrincipalName',
|
|
280
|
+
'ms-Mcs-AdmPwd',
|
|
281
|
+
'ms-Mcs-AdmPwdExpirationTime',
|
|
282
|
+
'msLAPS-Password',
|
|
283
|
+
'msLAPS-PasswordExpirationTime',
|
|
284
|
+
'lastLogonTimestamp',
|
|
285
|
+
'msDS-AllowedToDelegateTo',
|
|
286
|
+
'msDS-AllowedToActOnBehalfOfOtherIdentity',
|
|
287
|
+
'msDS-SupportedEncryptionTypes',
|
|
288
|
+
'memberOf',
|
|
289
|
+
'description',
|
|
290
|
+
'whenCreated',
|
|
291
|
+
'whenChanged',
|
|
292
|
+
'adminCount',
|
|
293
|
+
];
|
|
294
|
+
const results = await this.ldapProvider.search(baseDN, {
|
|
295
|
+
filter,
|
|
296
|
+
attributes,
|
|
297
|
+
scope: 'sub',
|
|
298
|
+
sizeLimit: maxComputers,
|
|
299
|
+
paged: true,
|
|
300
|
+
});
|
|
301
|
+
return results.map((entry) => ({
|
|
302
|
+
...entry,
|
|
303
|
+
dn: entry.dn,
|
|
304
|
+
sAMAccountName: entry.sAMAccountName,
|
|
305
|
+
dNSHostName: entry.dNSHostName,
|
|
306
|
+
operatingSystem: entry.operatingSystem,
|
|
307
|
+
operatingSystemVersion: entry.operatingSystemVersion,
|
|
308
|
+
lastLogon: convertFiletimeToDate(entry.lastLogon),
|
|
309
|
+
pwdLastSet: convertFiletimeToDate(entry.pwdLastSet),
|
|
310
|
+
enabled: !(entry.userAccountControl & 0x2),
|
|
311
|
+
memberOf: !entry.memberOf ? [] : Array.isArray(entry.memberOf) ? entry.memberOf : [entry.memberOf],
|
|
312
|
+
servicePrincipalName: !entry.servicePrincipalName
|
|
313
|
+
? []
|
|
314
|
+
: Array.isArray(entry.servicePrincipalName)
|
|
315
|
+
? entry.servicePrincipalName
|
|
316
|
+
: [entry.servicePrincipalName],
|
|
317
|
+
}));
|
|
318
|
+
}
|
|
319
|
+
async fetchDomain() {
|
|
320
|
+
try {
|
|
321
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
322
|
+
const filter = '(objectClass=domain)';
|
|
323
|
+
const attributes = [
|
|
324
|
+
'dn',
|
|
325
|
+
'name',
|
|
326
|
+
'msDS-Behavior-Version',
|
|
327
|
+
'minPwdLength',
|
|
328
|
+
'maxPwdAge',
|
|
329
|
+
'pwdHistoryLength',
|
|
330
|
+
'ms-DS-MachineAccountQuota',
|
|
331
|
+
];
|
|
332
|
+
const results = await this.ldapProvider.search(baseDN, {
|
|
333
|
+
filter,
|
|
334
|
+
attributes,
|
|
335
|
+
scope: 'base',
|
|
336
|
+
});
|
|
337
|
+
if (results.length === 0)
|
|
338
|
+
return null;
|
|
339
|
+
const entry = results[0];
|
|
340
|
+
const domainFunctionalLevel = entry['msDS-Behavior-Version'] !== undefined
|
|
341
|
+
? parseInt(entry['msDS-Behavior-Version'], 10)
|
|
342
|
+
: undefined;
|
|
343
|
+
let forestFunctionalLevel;
|
|
344
|
+
try {
|
|
345
|
+
const configDN = `CN=Partitions,CN=Configuration,${baseDN}`;
|
|
346
|
+
const forestResults = await this.ldapProvider.search(configDN, {
|
|
347
|
+
filter: '(objectClass=crossRefContainer)',
|
|
348
|
+
attributes: ['msDS-Behavior-Version'],
|
|
349
|
+
scope: 'base',
|
|
350
|
+
});
|
|
351
|
+
if (forestResults.length > 0 && forestResults[0]['msDS-Behavior-Version'] !== undefined) {
|
|
352
|
+
forestFunctionalLevel = parseInt(forestResults[0]['msDS-Behavior-Version'], 10);
|
|
353
|
+
}
|
|
354
|
+
}
|
|
355
|
+
catch (e) {
|
|
356
|
+
}
|
|
357
|
+
let recycleBinEnabled = false;
|
|
358
|
+
try {
|
|
359
|
+
const optionalFeaturesDN = `CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,${baseDN}`;
|
|
360
|
+
const recycleBinResults = await this.ldapProvider.search(optionalFeaturesDN, {
|
|
361
|
+
filter: '(cn=Recycle Bin Feature)',
|
|
362
|
+
attributes: ['msDS-EnabledFeatureBL'],
|
|
363
|
+
scope: 'sub',
|
|
364
|
+
});
|
|
365
|
+
if (recycleBinResults.length > 0) {
|
|
366
|
+
const enabledFeatureBL = recycleBinResults[0]['msDS-EnabledFeatureBL'];
|
|
367
|
+
recycleBinEnabled = enabledFeatureBL && (Array.isArray(enabledFeatureBL) ? enabledFeatureBL.length > 0 : true);
|
|
368
|
+
}
|
|
369
|
+
}
|
|
370
|
+
catch (e) {
|
|
371
|
+
}
|
|
372
|
+
return {
|
|
373
|
+
dn: entry.dn,
|
|
374
|
+
name: entry.name,
|
|
375
|
+
domainFunctionalLevel,
|
|
376
|
+
forestFunctionalLevel,
|
|
377
|
+
recycleBinEnabled,
|
|
378
|
+
...entry,
|
|
379
|
+
};
|
|
380
|
+
}
|
|
381
|
+
catch (error) {
|
|
382
|
+
console.error('Failed to fetch domain:', error);
|
|
383
|
+
return null;
|
|
384
|
+
}
|
|
385
|
+
}
|
|
386
|
+
async fetchGpoSecuritySettings() {
|
|
387
|
+
if (!this.smbConfig || !this.smbConfig.smb.enabled) {
|
|
388
|
+
logger_1.logger.debug('SMB is disabled, skipping GPO security settings fetch');
|
|
389
|
+
return null;
|
|
390
|
+
}
|
|
391
|
+
const { smb, ldap } = this.smbConfig;
|
|
392
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
393
|
+
const domainDnsName = this.extractDomainNameFromDN(baseDN);
|
|
394
|
+
let dcHostname = null;
|
|
395
|
+
try {
|
|
396
|
+
const dcResults = await this.ldapProvider.search(baseDN, {
|
|
397
|
+
filter: '(&(objectClass=computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))',
|
|
398
|
+
attributes: ['dNSHostName'],
|
|
399
|
+
scope: 'sub',
|
|
400
|
+
sizeLimit: 1,
|
|
401
|
+
});
|
|
402
|
+
if (dcResults.length > 0 && dcResults[0].dNSHostName) {
|
|
403
|
+
dcHostname = dcResults[0].dNSHostName;
|
|
404
|
+
}
|
|
405
|
+
}
|
|
406
|
+
catch (e) {
|
|
407
|
+
logger_1.logger.debug('Failed to find DC for GPO settings fetch', { error: e });
|
|
408
|
+
}
|
|
409
|
+
if (!dcHostname) {
|
|
410
|
+
const urlMatch = ldap.url.match(/ldaps?:\/\/([^:/]+)/i);
|
|
411
|
+
if (urlMatch && urlMatch[1]) {
|
|
412
|
+
dcHostname = urlMatch[1];
|
|
413
|
+
}
|
|
414
|
+
}
|
|
415
|
+
if (!dcHostname) {
|
|
416
|
+
logger_1.logger.debug('No DC hostname available for GPO settings fetch');
|
|
417
|
+
return null;
|
|
418
|
+
}
|
|
419
|
+
const username = smb.username || ldap.bindDN.split(',')[0]?.replace(/^CN=/i, '') || '';
|
|
420
|
+
const password = smb.password || ldap.bindPassword;
|
|
421
|
+
const baseDNMatch = ldap.baseDN.match(/DC=([^,]+)/i);
|
|
422
|
+
const smbProviderConfig = {
|
|
423
|
+
host: dcHostname,
|
|
424
|
+
share: 'SYSVOL',
|
|
425
|
+
domain: baseDNMatch?.[1] || '',
|
|
426
|
+
username,
|
|
427
|
+
password,
|
|
428
|
+
timeout: smb.timeout,
|
|
429
|
+
};
|
|
430
|
+
const smbProvider = new smb_provider_1.SMBProvider(smbProviderConfig);
|
|
431
|
+
try {
|
|
432
|
+
await smbProvider.connect();
|
|
433
|
+
const settings = await smbProvider.readGpoSecuritySettings(domainDnsName);
|
|
434
|
+
if (settings) {
|
|
435
|
+
logger_1.logger.debug('Successfully fetched GPO security settings from SYSVOL', {
|
|
436
|
+
domainDnsName,
|
|
437
|
+
hasLdapSigning: settings.ldapServerIntegrity !== undefined,
|
|
438
|
+
hasAuditPolicy: settings.auditPolicies !== undefined,
|
|
439
|
+
hasPsLogging: settings.powershellLogging !== undefined,
|
|
440
|
+
});
|
|
441
|
+
}
|
|
442
|
+
return settings;
|
|
443
|
+
}
|
|
444
|
+
catch (error) {
|
|
445
|
+
logger_1.logger.warn('Failed to fetch GPO security settings via SMB', { error, dcHostname });
|
|
446
|
+
return null;
|
|
447
|
+
}
|
|
448
|
+
finally {
|
|
449
|
+
await smbProvider.disconnect();
|
|
450
|
+
}
|
|
451
|
+
}
|
|
452
|
+
async fetchOUCount() {
|
|
453
|
+
try {
|
|
454
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
455
|
+
const filter = '(objectClass=organizationalUnit)';
|
|
456
|
+
const results = await this.ldapProvider.search(baseDN, {
|
|
457
|
+
filter,
|
|
458
|
+
attributes: ['dn'],
|
|
459
|
+
scope: 'sub',
|
|
460
|
+
paged: true,
|
|
461
|
+
});
|
|
462
|
+
return results.length;
|
|
463
|
+
}
|
|
464
|
+
catch (error) {
|
|
465
|
+
logger_1.logger.warn('Failed to fetch OU count', { error });
|
|
466
|
+
return 0;
|
|
467
|
+
}
|
|
468
|
+
}
|
|
469
|
+
async fetchAcls(users, groups, computers) {
|
|
470
|
+
const allAclEntries = [];
|
|
471
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
472
|
+
try {
|
|
473
|
+
(0, acl_parser_1.resetParseStats)();
|
|
474
|
+
const userDns = users.map((u) => u.dn);
|
|
475
|
+
const userAcls = await this.fetchAclsForObjects(userDns);
|
|
476
|
+
for (const entry of userAcls) {
|
|
477
|
+
allAclEntries.push(entry);
|
|
478
|
+
}
|
|
479
|
+
const groupDns = groups.map((g) => g.dn);
|
|
480
|
+
const groupAcls = await this.fetchAclsForObjects(groupDns);
|
|
481
|
+
for (const entry of groupAcls) {
|
|
482
|
+
allAclEntries.push(entry);
|
|
483
|
+
}
|
|
484
|
+
const computerDns = computers.map((c) => c.dn);
|
|
485
|
+
const computerAcls = await this.fetchAclsForObjects(computerDns);
|
|
486
|
+
for (const entry of computerAcls) {
|
|
487
|
+
allAclEntries.push(entry);
|
|
488
|
+
}
|
|
489
|
+
const systemObjects = [
|
|
490
|
+
baseDN,
|
|
491
|
+
`CN=AdminSDHolder,CN=System,${baseDN}`,
|
|
492
|
+
`CN=Policies,CN=System,${baseDN}`,
|
|
493
|
+
];
|
|
494
|
+
const systemAcls = await this.fetchAclsForObjects(systemObjects);
|
|
495
|
+
for (const entry of systemAcls) {
|
|
496
|
+
allAclEntries.push(entry);
|
|
497
|
+
}
|
|
498
|
+
return allAclEntries;
|
|
499
|
+
}
|
|
500
|
+
catch (error) {
|
|
501
|
+
logger_1.logger.warn('Failed to fetch ACL entries - insufficient permissions or unsupported configuration');
|
|
502
|
+
return [];
|
|
503
|
+
}
|
|
504
|
+
}
|
|
505
|
+
async fetchAclsForObjects(objectDns) {
|
|
506
|
+
const allAclEntries = [];
|
|
507
|
+
let _successCount = 0;
|
|
508
|
+
const BATCH_SIZE = 100;
|
|
509
|
+
for (let i = 0; i < objectDns.length; i += BATCH_SIZE) {
|
|
510
|
+
const batch = objectDns.slice(i, i + BATCH_SIZE);
|
|
511
|
+
const batchPromises = batch.map(async (dn) => {
|
|
512
|
+
try {
|
|
513
|
+
const results = await this.ldapProvider.search(dn, {
|
|
514
|
+
filter: '(objectClass=*)',
|
|
515
|
+
attributes: ['nTSecurityDescriptor'],
|
|
516
|
+
scope: 'base',
|
|
517
|
+
controls: [createSDFlagsControl()],
|
|
518
|
+
});
|
|
519
|
+
if (results.length > 0 && results[0].nTSecurityDescriptor) {
|
|
520
|
+
_successCount++;
|
|
521
|
+
const secDescriptor = results[0].nTSecurityDescriptor;
|
|
522
|
+
const buffer = Buffer.isBuffer(secDescriptor)
|
|
523
|
+
? secDescriptor
|
|
524
|
+
: Buffer.from(secDescriptor, 'binary');
|
|
525
|
+
const entries = (0, acl_parser_1.parseSecurityDescriptor)(buffer, dn);
|
|
526
|
+
return entries;
|
|
527
|
+
}
|
|
528
|
+
}
|
|
529
|
+
catch (error) {
|
|
530
|
+
return [];
|
|
531
|
+
}
|
|
532
|
+
return [];
|
|
533
|
+
});
|
|
534
|
+
const batchResults = await Promise.all(batchPromises);
|
|
535
|
+
batchResults.forEach((entries) => allAclEntries.push(...entries));
|
|
536
|
+
}
|
|
537
|
+
return allAclEntries;
|
|
538
|
+
}
|
|
539
|
+
async fetchCertificateTemplates() {
|
|
540
|
+
try {
|
|
541
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
542
|
+
const templatesDN = `CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,${baseDN}`;
|
|
543
|
+
const results = await this.ldapProvider.search(templatesDN, {
|
|
544
|
+
filter: '(objectClass=pKICertificateTemplate)',
|
|
545
|
+
attributes: [
|
|
546
|
+
'dn',
|
|
547
|
+
'cn',
|
|
548
|
+
'name',
|
|
549
|
+
'displayName',
|
|
550
|
+
'msPKI-Certificate-Name-Flag',
|
|
551
|
+
'msPKI-Enrollment-Flag',
|
|
552
|
+
'pKIExtendedKeyUsage',
|
|
553
|
+
'nTSecurityDescriptor',
|
|
554
|
+
],
|
|
555
|
+
scope: 'one',
|
|
556
|
+
controls: [createSDFlagsControl()],
|
|
557
|
+
});
|
|
558
|
+
return results.map((entry) => ({
|
|
559
|
+
dn: entry.dn,
|
|
560
|
+
cn: entry.cn || entry.name,
|
|
561
|
+
name: entry.name || entry.cn,
|
|
562
|
+
displayName: entry.displayName,
|
|
563
|
+
'msPKI-Certificate-Name-Flag': entry['msPKI-Certificate-Name-Flag']
|
|
564
|
+
? parseInt(entry['msPKI-Certificate-Name-Flag'], 10)
|
|
565
|
+
: 0,
|
|
566
|
+
'msPKI-Enrollment-Flag': entry['msPKI-Enrollment-Flag']
|
|
567
|
+
? parseInt(entry['msPKI-Enrollment-Flag'], 10)
|
|
568
|
+
: 0,
|
|
569
|
+
pKIExtendedKeyUsage: !entry.pKIExtendedKeyUsage
|
|
570
|
+
? []
|
|
571
|
+
: Array.isArray(entry.pKIExtendedKeyUsage)
|
|
572
|
+
? entry.pKIExtendedKeyUsage
|
|
573
|
+
: [entry.pKIExtendedKeyUsage],
|
|
574
|
+
nTSecurityDescriptor: entry.nTSecurityDescriptor,
|
|
575
|
+
}));
|
|
576
|
+
}
|
|
577
|
+
catch (error) {
|
|
578
|
+
logger_1.logger.debug('Could not fetch certificate templates (ADCS may not be configured)', { error });
|
|
579
|
+
return [];
|
|
580
|
+
}
|
|
581
|
+
}
|
|
582
|
+
async fetchCertificateAuthorities() {
|
|
583
|
+
try {
|
|
584
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
585
|
+
const enrollmentDN = `CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,${baseDN}`;
|
|
586
|
+
const results = await this.ldapProvider.search(enrollmentDN, {
|
|
587
|
+
filter: '(objectClass=pKIEnrollmentService)',
|
|
588
|
+
attributes: [
|
|
589
|
+
'dn',
|
|
590
|
+
'cn',
|
|
591
|
+
'name',
|
|
592
|
+
'dNSHostName',
|
|
593
|
+
'certificateTemplates',
|
|
594
|
+
'nTSecurityDescriptor',
|
|
595
|
+
],
|
|
596
|
+
scope: 'one',
|
|
597
|
+
controls: [createSDFlagsControl()],
|
|
598
|
+
});
|
|
599
|
+
return results.map((entry) => ({
|
|
600
|
+
dn: entry.dn,
|
|
601
|
+
cn: entry.cn || entry.name,
|
|
602
|
+
name: entry.name || entry.cn,
|
|
603
|
+
dNSHostName: entry.dNSHostName,
|
|
604
|
+
certificateTemplates: !entry.certificateTemplates
|
|
605
|
+
? []
|
|
606
|
+
: Array.isArray(entry.certificateTemplates)
|
|
607
|
+
? entry.certificateTemplates
|
|
608
|
+
: [entry.certificateTemplates],
|
|
609
|
+
nTSecurityDescriptor: entry.nTSecurityDescriptor,
|
|
610
|
+
}));
|
|
611
|
+
}
|
|
612
|
+
catch (error) {
|
|
613
|
+
logger_1.logger.debug('Could not fetch certificate authorities (ADCS may not be configured)', { error });
|
|
614
|
+
return [];
|
|
615
|
+
}
|
|
616
|
+
}
|
|
617
|
+
async fetchGPOsWithAcls() {
|
|
618
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
619
|
+
const gpos = [];
|
|
620
|
+
const links = [];
|
|
621
|
+
const gpoAcls = [];
|
|
622
|
+
try {
|
|
623
|
+
const gpoResults = await this.ldapProvider.search(`CN=Policies,CN=System,${baseDN}`, {
|
|
624
|
+
filter: '(objectClass=groupPolicyContainer)',
|
|
625
|
+
attributes: [
|
|
626
|
+
'dn',
|
|
627
|
+
'cn',
|
|
628
|
+
'displayName',
|
|
629
|
+
'gPCFileSysPath',
|
|
630
|
+
'flags',
|
|
631
|
+
'gPCMachineExtensionNames',
|
|
632
|
+
'nTSecurityDescriptor',
|
|
633
|
+
],
|
|
634
|
+
scope: 'one',
|
|
635
|
+
controls: [createSDFlagsControl()],
|
|
636
|
+
});
|
|
637
|
+
for (const entry of gpoResults) {
|
|
638
|
+
const flags = entry.flags ? parseInt(entry.flags, 10) : 0;
|
|
639
|
+
gpos.push({
|
|
640
|
+
dn: entry.dn,
|
|
641
|
+
cn: entry.cn,
|
|
642
|
+
displayName: entry.displayName,
|
|
643
|
+
gPCFileSysPath: entry.gPCFileSysPath,
|
|
644
|
+
flags,
|
|
645
|
+
gPCMachineExtensionNames: entry.gPCMachineExtensionNames,
|
|
646
|
+
nTSecurityDescriptor: entry.nTSecurityDescriptor,
|
|
647
|
+
});
|
|
648
|
+
if (entry.nTSecurityDescriptor) {
|
|
649
|
+
try {
|
|
650
|
+
const buffer = Buffer.isBuffer(entry.nTSecurityDescriptor)
|
|
651
|
+
? entry.nTSecurityDescriptor
|
|
652
|
+
: Buffer.from(entry.nTSecurityDescriptor, 'binary');
|
|
653
|
+
const aclEntries = (0, acl_parser_1.parseSecurityDescriptor)(buffer, entry.dn);
|
|
654
|
+
for (const acl of aclEntries) {
|
|
655
|
+
gpoAcls.push({
|
|
656
|
+
gpoDn: entry.dn,
|
|
657
|
+
gpoName: entry.displayName || entry.cn,
|
|
658
|
+
trustee: acl.trustee,
|
|
659
|
+
trusteeSid: acl.trustee,
|
|
660
|
+
accessMask: acl.accessMask,
|
|
661
|
+
aceType: typeof acl.aceType === 'string' ? parseInt(acl.aceType, 10) : acl.aceType,
|
|
662
|
+
});
|
|
663
|
+
}
|
|
664
|
+
}
|
|
665
|
+
catch (e) {
|
|
666
|
+
logger_1.logger.debug('Could not parse GPO ACLs for', { gpo: entry.displayName, error: e });
|
|
667
|
+
}
|
|
668
|
+
}
|
|
669
|
+
}
|
|
670
|
+
const linkResults = await this.ldapProvider.search(baseDN, {
|
|
671
|
+
filter: '(gPLink=*)',
|
|
672
|
+
attributes: ['dn', 'gPLink'],
|
|
673
|
+
scope: 'sub',
|
|
674
|
+
sizeLimit: 1000,
|
|
675
|
+
});
|
|
676
|
+
for (const entry of linkResults) {
|
|
677
|
+
const gpLink = entry.gPLink;
|
|
678
|
+
if (!gpLink)
|
|
679
|
+
continue;
|
|
680
|
+
const linkMatches = gpLink.matchAll(/\[LDAP:\/\/([^\]]+);(\d+)\]/gi);
|
|
681
|
+
for (const match of linkMatches) {
|
|
682
|
+
const gpoDn = match[1];
|
|
683
|
+
const options = parseInt(match[2], 10);
|
|
684
|
+
const guidMatch = gpoDn.match(/cn=(\{[^}]+\})/i);
|
|
685
|
+
if (guidMatch) {
|
|
686
|
+
links.push({
|
|
687
|
+
gpoGuid: guidMatch[1],
|
|
688
|
+
linkedTo: entry.dn,
|
|
689
|
+
enforced: (options & 2) !== 0,
|
|
690
|
+
disabled: (options & 1) !== 0,
|
|
691
|
+
});
|
|
692
|
+
}
|
|
693
|
+
}
|
|
694
|
+
}
|
|
695
|
+
}
|
|
696
|
+
catch (error) {
|
|
697
|
+
logger_1.logger.debug('Could not fetch GPOs with ACLs', { error });
|
|
698
|
+
}
|
|
699
|
+
return { gpos, links, gpoAcls };
|
|
700
|
+
}
|
|
701
|
+
async fetchTrustsExtended() {
|
|
702
|
+
try {
|
|
703
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
704
|
+
const results = await this.ldapProvider.search(`CN=System,${baseDN}`, {
|
|
705
|
+
filter: '(objectClass=trustedDomain)',
|
|
706
|
+
attributes: [
|
|
707
|
+
'dn',
|
|
708
|
+
'name',
|
|
709
|
+
'trustDirection',
|
|
710
|
+
'trustType',
|
|
711
|
+
'trustAttributes',
|
|
712
|
+
'flatName',
|
|
713
|
+
'securityIdentifier',
|
|
714
|
+
],
|
|
715
|
+
scope: 'one',
|
|
716
|
+
});
|
|
717
|
+
return results.map((entry) => {
|
|
718
|
+
const trustDirection = parseInt(entry.trustDirection || '0', 10);
|
|
719
|
+
const trustType = parseInt(entry.trustType || '0', 10);
|
|
720
|
+
const trustAttributes = parseInt(entry.trustAttributes || '0', 10);
|
|
721
|
+
const parsed = (0, trust_types_1.parseTrustAttributes)(trustAttributes);
|
|
722
|
+
return {
|
|
723
|
+
dn: entry.dn,
|
|
724
|
+
name: entry.name,
|
|
725
|
+
flatName: entry.flatName,
|
|
726
|
+
trustDirection,
|
|
727
|
+
trustType,
|
|
728
|
+
trustAttributes,
|
|
729
|
+
direction: (0, trust_types_1.parseTrustDirection)(trustDirection),
|
|
730
|
+
type: (0, trust_types_1.parseTrustType)(trustType, trustAttributes),
|
|
731
|
+
...parsed,
|
|
732
|
+
};
|
|
733
|
+
});
|
|
734
|
+
}
|
|
735
|
+
catch (error) {
|
|
736
|
+
logger_1.logger.debug('Could not fetch extended trust information', { error });
|
|
737
|
+
return [];
|
|
738
|
+
}
|
|
739
|
+
}
|
|
740
|
+
async fetchDomainConfig(domain) {
|
|
741
|
+
const baseDN = this.ldapProvider.getBaseDN();
|
|
742
|
+
const config = {
|
|
743
|
+
passwordPolicy: {
|
|
744
|
+
minPasswordLength: 0,
|
|
745
|
+
passwordHistoryLength: 0,
|
|
746
|
+
maxPasswordAge: 'Not configured',
|
|
747
|
+
minPasswordAge: 'Not configured',
|
|
748
|
+
lockoutThreshold: 0,
|
|
749
|
+
lockoutDuration: 'Not configured',
|
|
750
|
+
lockoutObservationWindow: 'Not configured',
|
|
751
|
+
complexity: false,
|
|
752
|
+
},
|
|
753
|
+
kerberosPolicy: (0, smb_provider_1.getDefaultKerberosPolicy)(),
|
|
754
|
+
domainInfo: {
|
|
755
|
+
forestName: '',
|
|
756
|
+
domainName: '',
|
|
757
|
+
domainMode: 'Unknown',
|
|
758
|
+
forestMode: 'Unknown',
|
|
759
|
+
domainControllers: [],
|
|
760
|
+
fsmoRoles: {},
|
|
761
|
+
},
|
|
762
|
+
trusts: [],
|
|
763
|
+
gpoSummary: {
|
|
764
|
+
totalGPOs: 0,
|
|
765
|
+
linkedGPOs: 0,
|
|
766
|
+
},
|
|
767
|
+
};
|
|
768
|
+
try {
|
|
769
|
+
const policyResults = await this.ldapProvider.search(baseDN, {
|
|
770
|
+
filter: '(objectClass=domain)',
|
|
771
|
+
attributes: [
|
|
772
|
+
'minPwdLength',
|
|
773
|
+
'pwdHistoryLength',
|
|
774
|
+
'maxPwdAge',
|
|
775
|
+
'minPwdAge',
|
|
776
|
+
'lockoutThreshold',
|
|
777
|
+
'lockoutDuration',
|
|
778
|
+
'lockOutObservationWindow',
|
|
779
|
+
'pwdProperties',
|
|
780
|
+
'name',
|
|
781
|
+
],
|
|
782
|
+
scope: 'base',
|
|
783
|
+
});
|
|
784
|
+
if (policyResults.length > 0) {
|
|
785
|
+
const policy = policyResults[0];
|
|
786
|
+
config.passwordPolicy.minPasswordLength = parseInt(policy.minPwdLength || '0', 10);
|
|
787
|
+
config.passwordPolicy.passwordHistoryLength = parseInt(policy.pwdHistoryLength || '0', 10);
|
|
788
|
+
config.passwordPolicy.maxPasswordAge = this.formatFiletimeDuration(policy.maxPwdAge);
|
|
789
|
+
config.passwordPolicy.minPasswordAge = this.formatFiletimeDuration(policy.minPwdAge);
|
|
790
|
+
config.passwordPolicy.lockoutThreshold = parseInt(policy.lockoutThreshold || '0', 10);
|
|
791
|
+
config.passwordPolicy.lockoutDuration = this.formatFiletimeDuration(policy.lockoutDuration);
|
|
792
|
+
config.passwordPolicy.lockoutObservationWindow = this.formatFiletimeDuration(policy.lockOutObservationWindow);
|
|
793
|
+
config.passwordPolicy.complexity = (parseInt(policy.pwdProperties || '0', 10) & 1) === 1;
|
|
794
|
+
config.domainInfo.domainName = policy.name || '';
|
|
795
|
+
}
|
|
796
|
+
if (domain) {
|
|
797
|
+
config.domainInfo.domainMode = this.getDomainModeName(domain.domainFunctionalLevel);
|
|
798
|
+
config.domainInfo.forestMode = this.getDomainModeName(domain.forestFunctionalLevel);
|
|
799
|
+
config.domainInfo.forestName = this.extractDomainNameFromDN(baseDN);
|
|
800
|
+
config.domainInfo.domainName = this.extractDomainNameFromDN(baseDN);
|
|
801
|
+
}
|
|
802
|
+
const dcResults = await this.ldapProvider.search(baseDN, {
|
|
803
|
+
filter: '(&(objectClass=computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))',
|
|
804
|
+
attributes: ['dNSHostName', 'name'],
|
|
805
|
+
scope: 'sub',
|
|
806
|
+
});
|
|
807
|
+
config.domainInfo.domainControllers = dcResults
|
|
808
|
+
.map((dc) => dc.dNSHostName || dc.name)
|
|
809
|
+
.filter((name) => name);
|
|
810
|
+
await this.fetchFSMORoles(config, baseDN);
|
|
811
|
+
await this.fetchTrusts(config, baseDN);
|
|
812
|
+
await this.fetchGPOCount(config, baseDN);
|
|
813
|
+
const dcHostname = config.domainInfo.domainControllers[0];
|
|
814
|
+
if (dcHostname) {
|
|
815
|
+
const domainDnsName = this.extractDomainNameFromDN(baseDN);
|
|
816
|
+
config.kerberosPolicy = await this.fetchKerberosPolicyViaSMB(domainDnsName, dcHostname);
|
|
817
|
+
}
|
|
818
|
+
else {
|
|
819
|
+
config.kerberosPolicy = (0, smb_provider_1.getDefaultKerberosPolicy)();
|
|
820
|
+
}
|
|
821
|
+
}
|
|
822
|
+
catch (error) {
|
|
823
|
+
logger_1.logger.warn('Failed to fetch some domain configuration', { error });
|
|
824
|
+
}
|
|
825
|
+
return config;
|
|
826
|
+
}
|
|
827
|
+
formatFiletimeDuration(filetime) {
|
|
828
|
+
if (!filetime)
|
|
829
|
+
return 'Not configured';
|
|
830
|
+
const value = typeof filetime === 'string' ? parseInt(filetime, 10) : filetime;
|
|
831
|
+
if (value === 0 || isNaN(value))
|
|
832
|
+
return 'Not configured';
|
|
833
|
+
const minutes = Math.abs(value) / (10000000 * 60);
|
|
834
|
+
if (minutes < 60) {
|
|
835
|
+
return `${Math.round(minutes)} min`;
|
|
836
|
+
}
|
|
837
|
+
else if (minutes < 1440) {
|
|
838
|
+
const hours = Math.round(minutes / 60);
|
|
839
|
+
return `${hours} hour${hours > 1 ? 's' : ''}`;
|
|
840
|
+
}
|
|
841
|
+
else {
|
|
842
|
+
const days = Math.round(minutes / 1440);
|
|
843
|
+
return `${days} day${days > 1 ? 's' : ''}`;
|
|
844
|
+
}
|
|
845
|
+
}
|
|
846
|
+
getDomainModeName(level) {
|
|
847
|
+
if (level === undefined)
|
|
848
|
+
return 'Unknown';
|
|
849
|
+
const levels = {
|
|
850
|
+
0: 'Windows2000Domain',
|
|
851
|
+
1: 'Windows2003InterimDomain',
|
|
852
|
+
2: 'Windows2003Domain',
|
|
853
|
+
3: 'Windows2008Domain',
|
|
854
|
+
4: 'Windows2008R2Domain',
|
|
855
|
+
5: 'Windows2012Domain',
|
|
856
|
+
6: 'Windows2012R2Domain',
|
|
857
|
+
7: 'Windows2016Domain',
|
|
858
|
+
};
|
|
859
|
+
return levels[level] || `Unknown (${level})`;
|
|
860
|
+
}
|
|
861
|
+
extractDomainNameFromDN(dn) {
|
|
862
|
+
const parts = dn.match(/DC=([^,]+)/gi);
|
|
863
|
+
if (!parts)
|
|
864
|
+
return dn;
|
|
865
|
+
return parts.map((p) => p.replace(/DC=/i, '')).join('.');
|
|
866
|
+
}
|
|
867
|
+
async fetchFSMORoles(config, baseDN) {
|
|
868
|
+
try {
|
|
869
|
+
const domainRoles = await this.ldapProvider.search(baseDN, {
|
|
870
|
+
filter: '(objectClass=domain)',
|
|
871
|
+
attributes: ['fSMORoleOwner'],
|
|
872
|
+
scope: 'base',
|
|
873
|
+
});
|
|
874
|
+
if (domainRoles.length > 0 && domainRoles[0].fSMORoleOwner) {
|
|
875
|
+
config.domainInfo.fsmoRoles.pdcEmulator = this.extractServerFromDN(domainRoles[0].fSMORoleOwner);
|
|
876
|
+
}
|
|
877
|
+
const ridResults = await this.ldapProvider.search(`CN=RID Manager$,CN=System,${baseDN}`, {
|
|
878
|
+
filter: '(objectClass=*)',
|
|
879
|
+
attributes: ['fSMORoleOwner'],
|
|
880
|
+
scope: 'base',
|
|
881
|
+
});
|
|
882
|
+
if (ridResults.length > 0 && ridResults[0].fSMORoleOwner) {
|
|
883
|
+
config.domainInfo.fsmoRoles.ridMaster = this.extractServerFromDN(ridResults[0].fSMORoleOwner);
|
|
884
|
+
}
|
|
885
|
+
const infraResults = await this.ldapProvider.search(`CN=Infrastructure,${baseDN}`, {
|
|
886
|
+
filter: '(objectClass=*)',
|
|
887
|
+
attributes: ['fSMORoleOwner'],
|
|
888
|
+
scope: 'base',
|
|
889
|
+
});
|
|
890
|
+
if (infraResults.length > 0 && infraResults[0].fSMORoleOwner) {
|
|
891
|
+
config.domainInfo.fsmoRoles.infrastructureMaster = this.extractServerFromDN(infraResults[0].fSMORoleOwner);
|
|
892
|
+
}
|
|
893
|
+
}
|
|
894
|
+
catch (error) {
|
|
895
|
+
logger_1.logger.debug('Could not fetch all FSMO roles', { error });
|
|
896
|
+
}
|
|
897
|
+
}
|
|
898
|
+
extractServerFromDN(dn) {
|
|
899
|
+
const match = dn.match(/CN=NTDS Settings,CN=([^,]+)/i);
|
|
900
|
+
return match && match[1] ? match[1] : dn;
|
|
901
|
+
}
|
|
902
|
+
async fetchTrusts(config, baseDN) {
|
|
903
|
+
try {
|
|
904
|
+
const trustResults = await this.ldapProvider.search(`CN=System,${baseDN}`, {
|
|
905
|
+
filter: '(objectClass=trustedDomain)',
|
|
906
|
+
attributes: ['name', 'trustDirection', 'trustType', 'trustAttributes'],
|
|
907
|
+
scope: 'one',
|
|
908
|
+
});
|
|
909
|
+
config.trusts = trustResults.map((trust) => {
|
|
910
|
+
const direction = parseInt(trust.trustDirection || '0', 10);
|
|
911
|
+
const trustType = parseInt(trust.trustType || '0', 10);
|
|
912
|
+
const attributes = parseInt(trust.trustAttributes || '0', 10);
|
|
913
|
+
return {
|
|
914
|
+
name: trust.name || 'Unknown',
|
|
915
|
+
direction: this.getTrustDirection(direction),
|
|
916
|
+
type: this.getTrustType(trustType),
|
|
917
|
+
transitive: (attributes & 1) === 1,
|
|
918
|
+
};
|
|
919
|
+
});
|
|
920
|
+
}
|
|
921
|
+
catch (error) {
|
|
922
|
+
logger_1.logger.debug('Could not fetch trust relationships', { error });
|
|
923
|
+
}
|
|
924
|
+
}
|
|
925
|
+
getTrustDirection(direction) {
|
|
926
|
+
switch (direction) {
|
|
927
|
+
case 1:
|
|
928
|
+
return 'inbound';
|
|
929
|
+
case 2:
|
|
930
|
+
return 'outbound';
|
|
931
|
+
case 3:
|
|
932
|
+
return 'bidirectional';
|
|
933
|
+
default:
|
|
934
|
+
return 'inbound';
|
|
935
|
+
}
|
|
936
|
+
}
|
|
937
|
+
getTrustType(type) {
|
|
938
|
+
switch (type) {
|
|
939
|
+
case 1:
|
|
940
|
+
return 'external';
|
|
941
|
+
case 2:
|
|
942
|
+
return 'external';
|
|
943
|
+
case 3:
|
|
944
|
+
return 'realm';
|
|
945
|
+
case 4:
|
|
946
|
+
return 'external';
|
|
947
|
+
default:
|
|
948
|
+
return 'external';
|
|
949
|
+
}
|
|
950
|
+
}
|
|
951
|
+
async fetchGPOCount(config, baseDN) {
|
|
952
|
+
try {
|
|
953
|
+
const gpoResults = await this.ldapProvider.search(`CN=Policies,CN=System,${baseDN}`, {
|
|
954
|
+
filter: '(objectClass=groupPolicyContainer)',
|
|
955
|
+
attributes: ['cn', 'gPCFileSysPath'],
|
|
956
|
+
scope: 'one',
|
|
957
|
+
});
|
|
958
|
+
config.gpoSummary.totalGPOs = gpoResults.length;
|
|
959
|
+
const linkedResults = await this.ldapProvider.search(baseDN, {
|
|
960
|
+
filter: '(gPLink=*)',
|
|
961
|
+
attributes: ['gPLink'],
|
|
962
|
+
scope: 'sub',
|
|
963
|
+
sizeLimit: 1000,
|
|
964
|
+
});
|
|
965
|
+
const linkedGPOs = new Set();
|
|
966
|
+
linkedResults.forEach((obj) => {
|
|
967
|
+
const gpLink = obj.gPLink;
|
|
968
|
+
if (gpLink) {
|
|
969
|
+
const matches = gpLink.match(/cn=\{[^}]+\}/gi);
|
|
970
|
+
if (matches) {
|
|
971
|
+
matches.forEach((m) => linkedGPOs.add(m.toLowerCase()));
|
|
972
|
+
}
|
|
973
|
+
}
|
|
974
|
+
});
|
|
975
|
+
config.gpoSummary.linkedGPOs = linkedGPOs.size;
|
|
976
|
+
}
|
|
977
|
+
catch (error) {
|
|
978
|
+
logger_1.logger.debug('Could not fetch GPO count', { error });
|
|
979
|
+
}
|
|
980
|
+
}
|
|
981
|
+
async fetchKerberosPolicyViaSMB(domainDnsName, dcHostname) {
|
|
982
|
+
if (!this.smbConfig || !this.smbConfig.smb.enabled) {
|
|
983
|
+
logger_1.logger.debug('SMB is disabled, returning default Kerberos policy values');
|
|
984
|
+
return (0, smb_provider_1.getDefaultKerberosPolicy)();
|
|
985
|
+
}
|
|
986
|
+
const { smb, ldap } = this.smbConfig;
|
|
987
|
+
const username = smb.username || ldap.bindDN.split(',')[0]?.replace(/^CN=/i, '') || '';
|
|
988
|
+
const password = smb.password || ldap.bindPassword;
|
|
989
|
+
const baseDNMatch = ldap.baseDN.match(/DC=([^,]+)/i);
|
|
990
|
+
const smbProviderConfig = {
|
|
991
|
+
host: dcHostname,
|
|
992
|
+
share: 'SYSVOL',
|
|
993
|
+
domain: baseDNMatch?.[1] || '',
|
|
994
|
+
username,
|
|
995
|
+
password,
|
|
996
|
+
timeout: smb.timeout,
|
|
997
|
+
};
|
|
998
|
+
const smbProvider = new smb_provider_1.SMBProvider(smbProviderConfig);
|
|
999
|
+
try {
|
|
1000
|
+
await smbProvider.connect();
|
|
1001
|
+
const kerberosPolicy = await smbProvider.readKerberosPolicy(domainDnsName);
|
|
1002
|
+
if (kerberosPolicy) {
|
|
1003
|
+
logger_1.logger.debug('Successfully fetched Kerberos policy from SYSVOL', { domainDnsName });
|
|
1004
|
+
return (0, smb_provider_1.formatKerberosPolicy)(kerberosPolicy, false);
|
|
1005
|
+
}
|
|
1006
|
+
logger_1.logger.debug('GptTmpl.inf not found, using Windows default Kerberos policy values');
|
|
1007
|
+
return (0, smb_provider_1.getDefaultKerberosPolicy)();
|
|
1008
|
+
}
|
|
1009
|
+
catch (error) {
|
|
1010
|
+
logger_1.logger.warn('Failed to fetch Kerberos policy via SMB, using defaults', { error, dcHostname });
|
|
1011
|
+
return (0, smb_provider_1.getDefaultKerberosPolicy)();
|
|
1012
|
+
}
|
|
1013
|
+
finally {
|
|
1014
|
+
await smbProvider.disconnect();
|
|
1015
|
+
}
|
|
1016
|
+
}
|
|
1017
|
+
}
|
|
1018
|
+
exports.ADAuditService = ADAuditService;
|
|
1019
|
+
//# sourceMappingURL=ad-audit.service.js.map
|