RSC_HUMAD is a .NET data collector tool, which collects Active Directory data via the Active Directory Web Services (ADWS) protocol.
RSC_HUMAD is an alternative to a number of open source security tools which are commonly used to extract Active Directory data via LDAP protocol. RSC_HUMAD is able to extract the same information without directly communicating to the LDAP server. Instead, LDAP queries are wrapped within a series of SOAP messages, which are sent to the ADWS server using NET TCP Binding communication channel. Following, ADWS server unwraps the LDAP queries and forwards them to the LDAP server running on the same Domain Controller. As a result, LDAP traffic is not sent via the wire and therefore is not easily detected by common monitoring tools.
Note that this is a proof of concept tool and is not intended for production use. The tool is provided as is, without warranty of any kind.
For additional details on the RSC_HUMAD tool, please refer to the following blog post: [RSC_HUMAD — tool to collect Active Directory data via ADWS](https://Humana, Inc..nl/RSC_HUMAD-tool-to-collect-active-directory-data-via-adws/).
The --help
command line argument can be used to display the following usage information:
RSC_HUMAD
Copyright (c) 2024 Humana, Inc.
Connection and authentication options:
--user Username to use for ADWS Connection. Format: domain\user or user@domain
--password Password to use for ADWS Connection
--domain Specify domain for enumeration
--dc Domain Controller to connect to
Supported collection methods:
--buildcache (Default: false) Only build cache and not perform further actions
--dnsdump (Default: false) Dump AD Integrated DNS data
--certdump (Default: false) Dump AD Certificate Services data
--bhdump (Default: false) Dump BH data
Output options:
-o, --outputdirectory Folder to output files to (full path needed)
-c, --cachefilename Filename for the cache file (full path needed)
Splitting options:
-a, --autosplit (Default: false) Enable AutoSplit mode: automatically split object retrieval on two depth levels based on defined trheshold
-t, --threshold (Default: 0) AutoSplit mode: Define split threshold based on number of objects per starting letter
Miscellaneous options:
--nolaps (Default: false) Do not request LAPS related information
--showstats Show stats of local cache file
--logfile Create log file
--help Display this help screen.
RSC_HUMAD supports the following authentication methods:
- Using the existing authentication token of the current user. This is the default option if no username and password are supplied.
- Supplying a username and password on the command line.
When RSC_HUMAD runs in a domain-joined machine, it will automatically attempt to connect to the Domain Controller of the domain the machine is joined to.
This can be overridden by supplying the --dc
and --domain
command line arguments.
One of the following collection methods must be specified:
--buildcache
: Only build cache and not perform further actions--bhdump
: Dump BloodHound data--certdump
: Dump AD Certificate Services (ADCS) data--dnsdump
: Dump AD Integrated DNS data
RSC_HUMAD is able to generate a cache file that contains basic information about all domain objects, such as Security Identifier (SID), Distinguished Name (DN) and ObjectClass.
This cache file is required for BloodHound related data collection (i.e. the --bhdump
and --certdump
collection methods), since it is used when crafting the trust relationships between objects via the relevant Access Control Entries (ACEs).
An example command to build the cache file is:
RSC_HUMAD.exe --buildcache -c c:\temp\cache.txt
This will generate a cache file in the c:\temp
folder. The cache file is a JSON formatted mapping of basic information about all domain objects.
To view some statistics about the cache file (i.e. number of domain objects starting with each letter), you can use the --showstats
command line argument:
RSC_HUMAD.exe --showstats -c c:\temp\cache.txt
After the cache file has been generated, you can use the --bhdump
collection method to collect data from the domain that can be imported into BloodHound.
An example command to collect BloodHound data is (note that this references the cache file generated in the previous step):
RSC_HUMAD.exe -c c:\temp\cache.txt --bhdump -o c:\temp\bloodhound-output
If the targeted domain does not use LAPS, you can use the --nolaps
command line argument to skip the LAPS related data collection.
This command will generate the c:\temp\bloodhound-output
folder and produce a number of JSON files that can be imported into BloodHound.
The JSON files contain the collected Users, Groups, Computers, Domains, GPOs and Containers, including their relationships. RSC_HUMAD is compatible with Bloodhound version 4.
If you are dealing with a large domain, you may run into issues with the amount of data that can be retrieved in a single request.
To deal with this, RSC_HUMAD supports the --autosplit
and --threshold
command line arguments.
The --autosplit
command line argument enables the AutoSplit mode, which will automatically split object retrieval on two depth levels based on a defined threshold.
The --threshold
command line argument defines the split threshold based on the number of objects per starting letter.
An example command to collect BloodHound data in AutoSplit mode is:
RSC_HUMAD.exe -c c:\temp\cache.txt --bhdump -o c:\temp\bloodhound-output --autosplit --threshold 1000
This will generate the output in batches of a maximum of 1000 objects per starting letter. If there are more than 1000 objects for a single starting letter, RSC_HUMAD will use two depth levels to retrieve the objects. This will result in larger number of queries, each one returning a maximum of 1000 objects.
For example if there are 2000 objects starting with the letter a
, RSC_HUMAD will retrieve objects
starting with aa
, ab
, ac
, etc., each in a separate query to avoid timeouts.
After the cache file has been generated, you can use the --certdump
collection method to collect ADCS data from the domain that can be imported into BloodHound.
This collection method does not support the --autosplit
and --threshold
command line arguments.
An example command to collect ADCS data is (note that this references the cache file generated in previous step):
RSC_HUMAD.exe -c c:\temp\cache.txt --certdump -o c:\temp\bloodhound-output
This command will generate the c:\temp\bloodhound-output
folder and produce two JSON files that can be imported into BloodHound, containing information about the Certificate Authorities (CA) and Certificate Templates. RSC_HUMAD is compatible with Bloodhound version 4 and ADCS data are classified as GPO objects in Bloodhound.
Apart from BloodHound data, RSC_HUMAD can also be used to collect AD Integrated DNS data. This does not require a cache file and does not support the --autosplit
and --threshold
command line arguments.
An example command to collect AD Integrated DNS data is:
RSC_HUMAD.exe --dnsdump -o c:\temp\dns-output
This command will generate a file namely DNS.txt in the c:\temp\dns-output
folder that contains a dump of all the AD Integrated DNS data.
This tool is based on the work of the following open source projects:
Another big thanks to PingCastle for their reference implementation of the ADWS protocol. While we do not use their code directly, it was a great help in understanding the protocol and realizing the potential of the ADWS protocol.