diff --git a/PowerHuntShares.psm1 b/PowerHuntShares.psm1 index 762b225..f6a8e33 100644 --- a/PowerHuntShares.psm1 +++ b/PowerHuntShares.psm1 @@ -4,7 +4,7 @@ #-------------------------------------- # Author: Scott Sutherland, 2024 NetSPI # License: 3-clause BSD -# Version: v1.158 +# Version: v1.160 # References: This script includes custom code and code taken and modified from the open source projects PowerView, Invoke-Ping, and Invoke-Parrell. function Invoke-HuntSMBShares { @@ -5935,13 +5935,20 @@ input[type="checkbox"]:checked::before { } .searchbar { - box-shadow: 0 2px 4px 0 #DEDFE1; + box-shadow: + 0px 2px 4px 0 #DEDFE1, /* Shadow on the top-left */ + 0px 2px 4px 0 #DEDFE1; /* Shadow on the top-right */ margin-left:10px; - background-color: #ccc; - border-radius: 2px; + background-color: white; + border-top-right-radius: 3px; + border-top-left-radius: 3px; width:95%; height: 40px; - outline:1px solid #BDBDBD; + box-sizing: border-box; + border-top: 1px solid lightgray; + border-left: 1px solid lightgray; + border-right: 1px solid lightgray; + } .circle { @@ -6056,16 +6063,18 @@ input[type="checkbox"]:checked::before { +
+
Loading...
+ Export   | + Clear +
-
-
Loading...
- Export -
- + + + + +
@@ -6290,25 +6299,19 @@ This section provides information for computers hosting shares configured with e + +
+
Loading...
+ Export   | + Clear +
-
-
Loading...
- Export -
-
+ +
@@ -6318,7 +6321,7 @@ This section provides information for computers hosting shares configured with e SU1FB+gHDA40BpbiKy8AAAEjSURBVBjTXZAxS4JhFIWfe5XqA6NIBSvK1pak2tqjvb8Q/oUImgPnqL/R7tbYVPCtUb46iKYoSUGK3tvQK0hnu889HO49Uq1eyOXVtRby+Q1VrSBSBpaBMRDMLG2GMLi/uzV5fXvPFIvFHRE5A0qAAVMgCyjQNbN6v99vyfBzVFTVc2ArprWAHrAJbANLQNts9qCqWom JAB/u9uzuPXd/AjqRl1T1QIEyIBGuiuiJiJwCGeArcgHZy8Zn5loHcsBL5IWF3bLGOxf1DUxEZP+feazgAfAF+OOOAGuxDQB396BmloJ3F8w5EXbjOXN1zCzVZggDM68D7dhxEttJ/mZvu1u92QyDzGw25fDoeJQkK0FExiAKTIAhkJrZY2g0urXajf0CiVl4icFa+XEAAAAASUVORK5CYII=" />Computer Name
is the name of the computer.
-
OS
Operating
System
The section provides the affected identities.$IdentityCombinedListCount identities were discovered across shares in the $TargetDomain Active Directory domain. $IdentityOwnerListCount were owners and $IdentityReferenceListCount were assigned privileges.

-
+
+
+Note: Within the context of this report, all read and write access the "Everyone", "Authenticated Users", "BUILTIN\Users", "Domain Users", or "Domain Computers" groups are considered excessive privileges, because all provide domain users access to the affected shares due to privilege inheritance. +

+
@@ -6411,27 +6418,16 @@ The section provides the affected identities.$IdentityCombinedListCount identiti
-
-Note: Within the context of this report, all read and write access the "Everyone", "Authenticated Users", "BUILTIN\Users", "Domain Users", or "Domain Computers" groups are considered excessive privileges, because all provide domain users access to the affected shares due to privilege inheritance. +
+
Loading...
+ Export   | + Clear
-
-
Loading...
- Export -
- +
@@ -6504,24 +6500,18 @@ This section provides the ACE (access control entries) configured with excessive - -
-
Loading...
- Export +
+
Loading...
+ Export   | + Clear
-
+ + + +
@@ -7042,10 +7032,18 @@ This section provide a summary and list of the affected shares grouped by name. + +
+
Loading...
+ Export   | + Clear +
-
-
Loading...
- Export -
-
+ + + +
Share
Count  
+
Loading...
+ Export   | + Clear +
-
-
Loading...
- Export -
- + +
@@ -7246,7 +7234,7 @@ Folder groups are SMB shares that contain the exact same file listing. Each fold This section includes a list of the credentials that were recovered during data collection. $SecretsRecoveredCount credentials were recovered from $SecretsRecoveredFileCount of the discovered $InterestingFilesAllObjectsSecretCount secrets files.

- +
Extracted Secrets Found @@ -7257,18 +7245,20 @@ This section includes a list of the credentials that were recovered during data
- - - -
-
Loading...
- Export +
+ +
+
Loading...
+ Export + Clear
-
Unique Share Names
+ + + +
@@ -9913,7 +9903,7 @@ This section provides some tips for prioritizing the remediation of shares confi
-
The scan context and run time information have been provided below.
+
The scan context and run time information have been provided below.

ComputerName
@@ -10623,11 +10613,11 @@ const ChartComputersOSOptions = { } }, title: { - text: 'Count', // Custom label for x-axis + text: 'Computer Count', // Custom label for x-axis style: { fontSize: '12px', fontWeight: 'normal', - color: '#000' + color: '#71808d' } } }, @@ -10640,11 +10630,11 @@ const ChartComputersOSOptions = { maxWidth: 400 }, title: { - text: 'OS', // Custom label for y-axis + text: 'Operating System', // Custom label for y-axis style: { fontSize: '12px', fontWeight: 'normal', - color: '#000' + color: '#71808d' } } },