diff --git a/PowerHuntShares.psm1 b/PowerHuntShares.psm1 index 762b225..f6a8e33 100644 --- a/PowerHuntShares.psm1 +++ b/PowerHuntShares.psm1 @@ -4,7 +4,7 @@ #-------------------------------------- # Author: Scott Sutherland, 2024 NetSPI # License: 3-clause BSD -# Version: v1.158 +# Version: v1.160 # References: This script includes custom code and code taken and modified from the open source projects PowerView, Invoke-Ping, and Invoke-Parrell. function Invoke-HuntSMBShares { @@ -5935,13 +5935,20 @@ input[type="checkbox"]:checked::before { } .searchbar { - box-shadow: 0 2px 4px 0 #DEDFE1; + box-shadow: + 0px 2px 4px 0 #DEDFE1, /* Shadow on the top-left */ + 0px 2px 4px 0 #DEDFE1; /* Shadow on the top-right */ margin-left:10px; - background-color: #ccc; - border-radius: 2px; + background-color: white; + border-top-right-radius: 3px; + border-top-left-radius: 3px; width:95%; height: 40px; - outline:1px solid #BDBDBD; + box-sizing: border-box; + border-top: 1px solid lightgray; + border-left: 1px solid lightgray; + border-right: 1px solid lightgray; + } .circle { @@ -6056,16 +6063,18 @@ input[type="checkbox"]:checked::before { +
-OS System -
+Note: Within the context of this report, all read and write access the "Everyone", "Authenticated Users", "BUILTIN\Users", "Domain Users", or "Domain Computers" groups are considered excessive privileges, because all provide domain users access to the affected shares due to privilege inheritance.
+
+
@@ -6411,27 +6418,16 @@ The section provides the affected identities.$IdentityCombinedListCount identiti
-
-Note: Within the context of this report, all read and write access the "Everyone", "Authenticated Users", "BUILTIN\Users", "Domain Users", or "Domain Computers" groups are considered excessive privileges, because all provide domain users access to the affected shares due to privilege inheritance.
+
-
-
-Loading...
- Export
-
|
---|