All Projects → InitRoot → shareAttack

InitRoot / shareAttack

Licence: MIT license
Automatically attack all file shares within AD network environment. Exploiting weak permissions.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to shareAttack

Ad Password Protection
Active Directory password filter featuring breached password checking and custom complexity rules
Stars: ✭ 210 (+1135.29%)
Mutual labels:  active-directory
FileShare
[Not maintained] FileShare is an Android library to send and receive files among Android devices in a WiFi LAN
Stars: ✭ 42 (+147.06%)
Mutual labels:  fileshare
go-adal
unofficial Active Directory Authentication Library for go
Stars: ✭ 14 (-17.65%)
Mutual labels:  active-directory
Zbang
zBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (+1217.65%)
Mutual labels:  active-directory
crimson-spray
A lockout aware password sprayer
Stars: ✭ 11 (-35.29%)
Mutual labels:  active-directory
PSPasswordExpiryNotifications
Following PowerShell Module provides different approach to scheduling password notifications for expiring Active Directory based accounts. While most of the scripts require knowledge on HTML... this one is just one config file and a bit of tingling around with texts. Whether this is good or bad it's up to you to decide. I do plan to add an optio…
Stars: ✭ 38 (+123.53%)
Mutual labels:  active-directory
Adaz
🔧 Automatically deploy customizable Active Directory labs in Azure
Stars: ✭ 197 (+1058.82%)
Mutual labels:  active-directory
RapidRepoPull
The goal of this program is to quickly pull and install repos from its list
Stars: ✭ 40 (+135.29%)
Mutual labels:  active-directory
ActiveDirectoryEnumeration
Enumerate AD through LDAP with a collection of helpfull scripts being bundled
Stars: ✭ 127 (+647.06%)
Mutual labels:  active-directory
FindUncommonShares
FindUncommonShares.py is a Python equivalent of PowerView's Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows Domains.
Stars: ✭ 186 (+994.12%)
Mutual labels:  active-directory
Paw
Stars: ✭ 243 (+1329.41%)
Mutual labels:  active-directory
Adtimeline
Timeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+1382.35%)
Mutual labels:  active-directory
active-directory-lookup
Simplest Java API (and CLI) for authenticating and searching in Active Directory
Stars: ✭ 15 (-11.76%)
Mutual labels:  active-directory
Ad Ldap Enum
An LDAP based Active Directory user and group enumeration tool
Stars: ✭ 223 (+1211.76%)
Mutual labels:  active-directory
ansible-role-system ldap
Configures SSSD to authenticate against AD's LDAP endpoints
Stars: ✭ 31 (+82.35%)
Mutual labels:  active-directory
Powershell Scripts
PowerShell scripts ranging from SCCM, MSO, AD, and other corporate enterprise uses... to sending cat facts to coworkers.
Stars: ✭ 201 (+1082.35%)
Mutual labels:  active-directory
requests auth
Authentication classes to be used with requests
Stars: ✭ 28 (+64.71%)
Mutual labels:  active-directory
DEFCON25 Attack Defend ActiveDirectory Workshop
Workshop Materials from DEFCON 25 (7/27/2017)
Stars: ✭ 19 (+11.76%)
Mutual labels:  active-directory
ActiveDirectoryCSDsc
DSC resources for installing or uninstalling Active Directory Certificate Services components in Windows Server.
Stars: ✭ 45 (+164.71%)
Mutual labels:  active-directory
passport-activedirectory
Active Directory strategy for passport.js
Stars: ✭ 28 (+64.71%)
Mutual labels:  active-directory

Disclaimer

I take not responsibility for your use of the software. Development is done in my personal capacity and carry no affiliation to my work.

ShareAttack!

Crawl any windows network with Active Directory for computers and subsequently launch an attack on weak file permissions.

Usage: Run ShareAttack!.py, ensure DSQUERY and SHARELOCATOR are included in the same root folder.

Synops: This attack exploits weak file permissions allowing users to overwrite file permissions assigned to file shares. Instead of exploiting file shares to gain access, the attack focuses on DENYING access to file shares. The attack uses the exploited account's credentials, (administrator account will be much more powerful).

Files:

  • ShareAttack!.py (main file to launch attack)
  • dsquery.exe (standard DSQUERY to extract AD computers) https://technet.microsoft.com/en-us/library/cc732952(v=ws.11).aspx
  • sharelocator.exe (Extract file shares from target server using srvsvc.NetShareEnumAll MSRPC function and then apply deny permissions (C++ please request source))

Walkthrough:

  1. Load files onto target.
  2. Execute ShareAttack!.py
  3. Will automatically execute dsquery command to extract domain computers.
  4. Test computers and retain active hosts.
  5. Pass active computers onto ShareLocator.
  6. ShareLocator will find all fileshares on target.
  7. Attempt to apply DENY permission for each user with access.

Requirements:

  • Windows computer environment, with AD for dsquery.
  • Python 3.6 feel free to port, reference GIT please.
  • Weak file permissions :P

Version: 0.1

Parameters: $crawl_limit: set amount of computers to extract from AD, 0 extracts all.

Alternatives [future to-do]:

  • ShareAttack!.py not required, can use only sharelocator.exe Sharelocator <servername>
  • Replace DSQUERY with IP range or provide option to user at startup
  • Port .py to Windows

Note that non lethal version is uploaded, please msg to request lethal version

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].