Skip to content

Automatically attack all file shares within AD network environment. Exploiting weak permissions.

License

Notifications You must be signed in to change notification settings

InitRoot/shareAttack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Disclaimer

I take not responsibility for your use of the software. Development is done in my personal capacity and carry no affiliation to my work.

ShareAttack!

Crawl any windows network with Active Directory for computers and subsequently launch an attack on weak file permissions.

Usage: Run ShareAttack!.py, ensure DSQUERY and SHARELOCATOR are included in the same root folder.

Synops: This attack exploits weak file permissions allowing users to overwrite file permissions assigned to file shares. Instead of exploiting file shares to gain access, the attack focuses on DENYING access to file shares. The attack uses the exploited account's credentials, (administrator account will be much more powerful).

Files:

  • ShareAttack!.py (main file to launch attack)
  • dsquery.exe (standard DSQUERY to extract AD computers) https://technet.microsoft.com/en-us/library/cc732952(v=ws.11).aspx
  • sharelocator.exe (Extract file shares from target server using srvsvc.NetShareEnumAll MSRPC function and then apply deny permissions (C++ please request source))

Walkthrough:

  1. Load files onto target.
  2. Execute ShareAttack!.py
  3. Will automatically execute dsquery command to extract domain computers.
  4. Test computers and retain active hosts.
  5. Pass active computers onto ShareLocator.
  6. ShareLocator will find all fileshares on target.
  7. Attempt to apply DENY permission for each user with access.

Requirements:

  • Windows computer environment, with AD for dsquery.
  • Python 3.6 feel free to port, reference GIT please.
  • Weak file permissions :P

Version: 0.1

Parameters: $crawl_limit: set amount of computers to extract from AD, 0 extracts all.

Alternatives [future to-do]:

  • ShareAttack!.py not required, can use only sharelocator.exe Sharelocator <servername>
  • Replace DSQUERY with IP range or provide option to user at startup
  • Port .py to Windows

Note that non lethal version is uploaded, please msg to request lethal version

About

Automatically attack all file shares within AD network environment. Exploiting weak permissions.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages