Update README.md

This commit is contained in:
Scott Sutherland 2024-11-09 13:53:44 -06:00 committed by GitHub
parent c59898fee5
commit eb24907305
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -14,13 +14,13 @@ Excessive SMB share ACLs are a systemic problem and an attack surface that all o
<br><br>
Bonus Features:
<br>
* Generate directory listing dump for configurable depth
* Search for file types across discovered shares
* Stand alone LLM functions: https://github.com/NetSPI/PowerHuntShares/blob/main/Scripts/Invoke-FingerPrintShare.ps1
* Stand alone password parsers: https://github.com/NetSPI/PowerHuntShares/tree/main/Scripts/ConfigParsers
I've also put together a few other resources to get you started:
* Blog: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares/
* Presentation Video : https://www.youtube.com/watch?v=TtwyQchCz6E
* Presentation Slides: https://www.slideshare.net/nullbind/into-the-abyss-evaluating-active-directory-smb-shares-on-scale-secure360-251762721
PowerHuntShares v1 Resources:
* v1 Blog: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares/
* v1 Presentation Video : https://www.youtube.com/watch?v=TtwyQchCz6E
* v1 Presentation Slides: https://www.slideshare.net/nullbind/into-the-abyss-evaluating-active-directory-smb-shares-on-scale-secure360-251762721
# Vocabulary
PowerHuntShares will inventory SMB share ACLs configured with "excessive privileges" and highlight "high risk" ACLs. Below is how those are defined in this context.