diff --git a/PowerHuntShares.psm1 b/PowerHuntShares.psm1
index ffba12c..be74efa 100644
--- a/PowerHuntShares.psm1
+++ b/PowerHuntShares.psm1
@@ -4,7 +4,7 @@
#--------------------------------------
# Author: Scott Sutherland, 2024 NetSPI
# License: 3-clause BSD
-# Version: v1.154
+# Version: v1.155
# References: This script includes custom code and code taken and modified from the open source projects PowerView, Invoke-Ping, and Invoke-Parrell.
function Invoke-HuntSMBShares
{
@@ -6017,12 +6017,12 @@ input[type="checkbox"]:checked::before {
-
Interesting Files
-
+
Interesting Files
This section provides a list of files that may contain passwords or sensitive data, or may be abused for remote code execution.
+
@@ -6236,9 +6236,9 @@ $CardLastModifiedTimeLine
Computers
-
-$ComputerCount computers were found in the $TargetDomain Active Directory domain, $ComputerPingableCount responded to ping requests, $Computers445OpenCount had port 445 open, and $ComputerWithExcessive were found hosting shares configured with excessive privileges. Below is a list of the computers hosting shares configured with excessive privileges.
+This section provides information for computers hosting shares configured with excessive privileges. $ComputerCount computers were found in the $TargetDomain Active Directory domain, $ComputerPingableCount responded to ping requests, $Computers445OpenCount had port 445 open, and $ComputerWithExcessive were found hosting shares configured with excessive privileges.
+
@@ -6360,9 +6360,9 @@ $ComputerCount computers were found in the $TargetDomain Active Directory domain
Identities
-
-$IdentityCombinedListCount identities were discovered across shares in the $TargetDomain Active Directory domain. $IdentityOwnerListCount were owners and $IdentityReferenceListCount were assigned privileges.
+The section provides the affected identities.$IdentityCombinedListCount identities were discovered across shares in the $TargetDomain Active Directory domain. $IdentityOwnerListCount were owners and $IdentityReferenceListCount were assigned privileges.
+
@@ -6461,9 +6461,9 @@ Note: Within the context of this report, all read and write access the "Everyone
Insecure ACEs
-
-Below is a list of the ACE (access control entries) configured with excessive privileges found in the $TargetDomain Active Directory domain.
+This section provides the ACE (access control entries) configured with excessive privileges found in the $TargetDomain Active Directory domain.
+
@@ -6553,9 +6553,9 @@ Below is a list of the ACE (access control entries) configured with excessive pr
Computer Summary
-
-Below is a summary of the domain computers that were targeted, connectivity to them, and the number that are hosting potentially insecure SMB shares.
+This section provides a summary of the domain computers that were targeted, connectivity to them, and the number that are hosting potentially insecure SMB shares.
+
@@ -7006,9 +7006,9 @@ Below is a summary of the exposure associated with each of those groups.
Share Names
-
-$AllSMBSharesCount shares were discovered across $ComputerPingableCount live computers in the $TargetDomain Active Directory domain. $ExcessiveSharesCount of those shares were found configured with excessive privileges across $ComputerWithExcessive computers. Below is a summary of the affected shares grouped by name.
+This section provide a summary and list of the affected shares grouped by name. $AllSMBSharesCount shares were discovered across $ComputerPingableCount live computers in the $TargetDomain Active Directory domain. $ExcessiveSharesCount of those shares were found configured with excessive privileges across $ComputerWithExcessive computers.
+
@@ -7114,16 +7114,16 @@ $AllSMBSharesCount shares were discovered across $ComputerPingableCount live com
Networks
-
-$SubnetsCount networks/subnets were found associated with computers that host shares that are configured with excessive privileges.
+This section provides an overview of the affected networks. $SubnetsCount networks/subnets were found associated with computers that host shares that are configured with excessive privileges.
+
$SubnetSummaryHTML
@@ -7165,9 +7165,9 @@ This section lists the most common share owners.
Folder Groups
-
Folder groups are SMB shares that contain the exact same file listing. Each folder group has been hashed so they can be quickly correlated. In some cases, shares with the exact same file listing may be related to a single application or process. This information can help identify the root cause associated with the excessive privileges and expedite remediation.
+
@@ -7235,16 +7235,16 @@ Folder groups are SMB shares that contain the exact same file listing. Each fold
Extracted Secrets
-
-This page includes a list of the credentials that were recovered during data collection. $SecretsRecoveredCount credentials were recovered from $SecretsRecoveredFileCount of the discovered $InterestingFilesAllObjectsSecretCount secrets files.
+This section includes a list of the credentials that were recovered during data collection. $SecretsRecoveredCount credentials were recovered from $SecretsRecoveredFileCount of the discovered $InterestingFilesAllObjectsSecretCount secrets files.
+
@@ -7296,14 +7296,13 @@ This page includes a list of the credentials that were recovered during data col
-
ShareGraph
-
+
ShareGraph
- This is an experimental interactive graph for exploring share relationships.
+ This sectin include an experimental interactive graph for exploring share relationships.
@@ -9710,9 +9709,9 @@ document.querySelector('#nodemenu a:nth-child(2)').addEventListener('click', fun
Exploiting Access
-
-Below are some tips for getting started on exploiting share access.
+This sectionprovides some tips for exploiting share access.
+
@@ -9774,7 +9773,8 @@ Below are some tips for getting started on exploiting share access.
Recommendations
-Below are some tips for getting started on building detections for potentially malicious share scanning events.
+This section provides some tips for detecting potentially malicious share scanning events.
+
@@ -9837,9 +9837,9 @@ Guest access to the system should also be revoked and ensure that adequate acces
Remediate
-
-Below are some tips for getting started on prioritizing the remediation of shares configured with excessive privileges.
+This section provides some tips for prioritizing the remediation of shares configured with excessive privileges.
+