From 2f23e5d2b64dcab2e23dda3b7c41f63ef65b50ab Mon Sep 17 00:00:00 2001 From: Scott Sutherland Date: Wed, 9 Oct 2024 16:56:26 -0500 Subject: [PATCH] Update PowerHuntShares.psm1 Small style updates. --- PowerHuntShares.psm1 | 56 ++++++++++++++++++++++---------------------- 1 file changed, 28 insertions(+), 28 deletions(-) diff --git a/PowerHuntShares.psm1 b/PowerHuntShares.psm1 index ffba12c..be74efa 100644 --- a/PowerHuntShares.psm1 +++ b/PowerHuntShares.psm1 @@ -4,7 +4,7 @@ #-------------------------------------- # Author: Scott Sutherland, 2024 NetSPI # License: 3-clause BSD -# Version: v1.154 +# Version: v1.155 # References: This script includes custom code and code taken and modified from the open source projects PowerView, Invoke-Ping, and Invoke-Parrell. function Invoke-HuntSMBShares { @@ -6017,12 +6017,12 @@ input[type="checkbox"]:checked::before {
-

Interesting Files

-
+

Interesting Files

This section provides a list of files that may contain passwords or sensitive data, or may be abused for remote code execution. +

@@ -6236,9 +6236,9 @@ $CardLastModifiedTimeLine

Computers

-
-$ComputerCount computers were found in the $TargetDomain Active Directory domain, $ComputerPingableCount responded to ping requests, $Computers445OpenCount had port 445 open, and $ComputerWithExcessive were found hosting shares configured with excessive privileges. Below is a list of the computers hosting shares configured with excessive privileges. +This section provides information for computers hosting shares configured with excessive privileges. $ComputerCount computers were found in the $TargetDomain Active Directory domain, $ComputerPingableCount responded to ping requests, $Computers445OpenCount had port 445 open, and $ComputerWithExcessive were found hosting shares configured with excessive privileges. +

@@ -6360,9 +6360,9 @@ $ComputerCount computers were found in the $TargetDomain Active Directory domain

Identities

-
-$IdentityCombinedListCount identities were discovered across shares in the $TargetDomain Active Directory domain. $IdentityOwnerListCount were owners and $IdentityReferenceListCount were assigned privileges. +The section provides the affected identities.$IdentityCombinedListCount identities were discovered across shares in the $TargetDomain Active Directory domain. $IdentityOwnerListCount were owners and $IdentityReferenceListCount were assigned privileges. +

@@ -6461,9 +6461,9 @@ Note: Within the context of this report, all read and write access the "Everyone

Insecure ACEs

-
-Below is a list of the ACE (access control entries) configured with excessive privileges found in the $TargetDomain Active Directory domain. +This section provides the ACE (access control entries) configured with excessive privileges found in the $TargetDomain Active Directory domain. +

@@ -6553,9 +6553,9 @@ Below is a list of the ACE (access control entries) configured with excessive pr

Computer Summary

-
-Below is a summary of the domain computers that were targeted, connectivity to them, and the number that are hosting potentially insecure SMB shares. +This section provides a summary of the domain computers that were targeted, connectivity to them, and the number that are hosting potentially insecure SMB shares. +

@@ -7006,9 +7006,9 @@ Below is a summary of the exposure associated with each of those groups.

Share Names

-
-$AllSMBSharesCount shares were discovered across $ComputerPingableCount live computers in the $TargetDomain Active Directory domain. $ExcessiveSharesCount of those shares were found configured with excessive privileges across $ComputerWithExcessive computers. Below is a summary of the affected shares grouped by name. +This section provide a summary and list of the affected shares grouped by name. $AllSMBSharesCount shares were discovered across $ComputerPingableCount live computers in the $TargetDomain Active Directory domain. $ExcessiveSharesCount of those shares were found configured with excessive privileges across $ComputerWithExcessive computers. +

@@ -7114,16 +7114,16 @@ $AllSMBSharesCount shares were discovered across $ComputerPingableCount live com

Networks

-
-$SubnetsCount networks/subnets were found associated with computers that host shares that are configured with excessive privileges. +This section provides an overview of the affected networks. $SubnetsCount networks/subnets were found associated with computers that host shares that are configured with excessive privileges. +

$SubnetSummaryHTML @@ -7165,9 +7165,9 @@ This section lists the most common share owners.

Folder Groups

-
Folder groups are SMB shares that contain the exact same file listing. Each folder group has been hashed so they can be quickly correlated. In some cases, shares with the exact same file listing may be related to a single application or process. This information can help identify the root cause associated with the excessive privileges and expedite remediation. +

@@ -7235,16 +7235,16 @@ Folder groups are SMB shares that contain the exact same file listing. Each fold

Extracted Secrets

-
-This page includes a list of the credentials that were recovered during data collection. $SecretsRecoveredCount credentials were recovered from $SecretsRecoveredFileCount of the discovered $InterestingFilesAllObjectsSecretCount secrets files. +This section includes a list of the credentials that were recovered during data collection. $SecretsRecoveredCount credentials were recovered from $SecretsRecoveredFileCount of the discovered $InterestingFilesAllObjectsSecretCount secrets files. +

@@ -7296,14 +7296,13 @@ This page includes a list of the credentials that were recovered during data col
-

ShareGraph

-
+

ShareGraph

- This is an experimental interactive graph for exploring share relationships. + This sectin include an experimental interactive graph for exploring share relationships.
@@ -9710,9 +9709,9 @@ document.querySelector('#nodemenu a:nth-child(2)').addEventListener('click', fun

Exploiting Access

-
-Below are some tips for getting started on exploiting share access. +This sectionprovides some tips for exploiting share access. +

@@ -9774,7 +9773,8 @@ Below are some tips for getting started on exploiting share access.

Recommendations

-Below are some tips for getting started on building detections for potentially malicious share scanning events. +This section provides some tips for detecting potentially malicious share scanning events. +

@@ -9837,9 +9837,9 @@ Guest access to the system should also be revoked and ensure that adequate acces

Remediate

-
-Below are some tips for getting started on prioritizing the remediation of shares configured with excessive privileges. +This section provides some tips for prioritizing the remediation of shares configured with excessive privileges. +