Automatically attack all file shares within AD network environment. Exploiting weak permissions.
I take not responsibility for your use of the software. Development is done in my personal capacity and carry no affiliation to my work.
Crawl any windows network with Active Directory for computers and subsequently launch an attack on weak file permissions.
Usage: Run ShareAttack!.py, ensure DSQUERY and SHARELOCATOR are included in the same root folder.
Synops: This attack exploits weak file permissions allowing users to overwrite file permissions assigned to file shares.
Instead of exploiting file shares to gain access, the attack focuses on DENYING access to file shares. The attack uses the exploited account’s credentials, (administrator account will be much more powerful).
Files:
Walkthrough:
Requirements:
Version: 0.1
Parameters: $crawl_limit: set amount of computers to extract from AD, 0 extracts all.
Alternatives [future to-do]:
Sharelocator <servername>
Note that non lethal version is uploaded, please msg to request lethal version