# Domain Password Audit Tool

{% embed url="<https://github.com/clr2of8/DPAT>" %}

Domain Password Audit Tool (DPAT) is a tool that will create password statistics from password hashes and a cracked password file, such as the *hashcat.potfile* file generated by Hashcat as it successfully cracks passwords.

DPAT is pretty straightforward to use:

```fish
dpat.py -n [ntds file] -c [crack file] <options>

## OPTIONS
-o [file]                           Output Filename
-g [file]                           Grouplists (ex. domain_admins)
-s                                  Partially Redact Passwords
```

Here is an example where I give DPAT an NTDS file, a *hashcat.potfile* file, and a *domain\_admins.txt* file to generate password statistics:

```fish
dpat.py -n weelee.ntds -c hashcat.potfile -g domain_admins.txt
```

{% hint style="info" %}
The users in the group lists given to DPAT should be in the format *DOMAIN\USER* (e.g., *weelee.zip\weelee*)
{% endhint %}
