From 9843e77f75260e609d31916356c19d300f82e778 Mon Sep 17 00:00:00 2001 From: Dakhama mehdi <49924401+dakhama-mehdi@users.noreply.github.com> Date: Wed, 30 Oct 2024 00:47:58 +0100 Subject: [PATCH] Add files via upload --- Exemples_HTML/hardensysvol_2.html | 2368 +++++++++++++++++++++++++++++ 1 file changed, 2368 insertions(+) create mode 100644 Exemples_HTML/hardensysvol_2.html diff --git a/Exemples_HTML/hardensysvol_2.html b/Exemples_HTML/hardensysvol_2.html new file mode 100644 index 0000000..0e2f7fc --- /dev/null +++ b/Exemples_HTML/hardensysvol_2.html @@ -0,0 +1,2368 @@ + + + HardenSysvol
Domain : INFO.LAB
Report date: 10/30/2024 00:41:44
Elapsed : 00:01:04
 Tab 1 : Dashboard
 Tab 2 : Details
  • Harden-Sysvol _ Version : 1.6 _ Release : 10/2024
  • Author : Dakhama Mehdi
    +
    Credit : HardenAD Community HardenAD +
    Credit : It-connect Community It-Connect +
    Thanks : Przemyslaw Klys Evotec for Module PSWriteHTML/PswriteOffice
The Sysvol folder is crucial for distributing scripts and Group Policy Objects (GPOs) to all domain computers. + It may contain sensitive information, such as plain-text passwords, making it a prime target for attackers. +
A vulnerability in Sysvol can compromise the entire domain. Therefore, it is essential to restrict permissions, monitor changes, + and regularly audit its contents to ensure network security and compliance.
Regularly audit GPOs to verify their contents, such as plain-text passwords in configuration files or auto-logon scripts, + and the presence of unsigned sources.
Frequently run the GPOZaurr tool, which provides a comprehensive report to help identify and mitigate these risks. +
GPOZaurr
Enable audits on the Sysvol folder and monitor logs for multiple search attempts, as this may indicate enumeration attempts. + Some elements in the Sysvol folder are not meant to be accessed by everyone. If possible, place a honeypot script in the Netlogon folder to trigger alerts for suspicious activity. +
Autologon
Do not store large files, such as ISO or .zip files, in the Sysvol folder. This can lead to replication issues and unnecessary consumption of storage resources, impacting the performance and reliability of your network
Move your scripts to a shared folder and grant access only to the relevant groups, not authenticated users. This will reduce vulnerabilities, especially if the scripts contain credentials or deploy critical applications.
Use AD hardening to ensure security and reduce risks.
Disable old protocols like SMB1 and anonymous enumeration on DC shares. +
Implement an N-tier architecture model, a PAW, and Silos. + To facilitate this, refer to the HardenAD project. +
HardenAD
FilePathpatternReason
Name