Skip to main content

Enumerate Shares in a Network - PSP Assignment 0x2

Before we start I would like to bring your attention to this PSP course from Pentester Academy  -
https://www.pentesteracademy.com/course?id=21. The course is focused on Powershell scripting which can be used in pentesting activities.

Image result for network shares icon
(Image Source: winaero)


Description -

A powershell script that takes list of target IPs and enumerate all open shares in a network,mark them with read and write access separately.

Script Code -


Proof of Concept -


References -
https://gallery.technet.microsoft.com/scriptcenter/a231026a-3fdb-4190-9915-38d8cd827348

The script can be found on my github -
https://github.com/hexachordanu/PSP/blob/master/Scan-Shares.ps1

This blog post has been created for completing the requirements of the SecurityTube PowerShell for Penetration Testers Certification Exam
https://www.pentesteracademy.com/course?id=21
Student ID: PSP-3250

Comments

  1. With must-drop jackpots awarded by 11pm each night, Red Tiger’s Daily Jackpots slots deliver final word|the last word} OJO fun, 24/7. All reels must be accompanied by buttons which allow players to manually stop them, reels could not spin sooner than 먹튀검증사이트 80 RPM, and reels must stop inside 0.19 seconds of a button press. In apply, this means that machines can not let reels slip more than 4 symbols. Other guidelines include a 15 coin payout cap, a 50 credit score cap on machines, a three coin maximum bet, and other such regulations.

    ReplyDelete
  2. One cause is that there is only a single membership and that has been arrange in a remote mining region which is extremely challenging to get to from Seoul. According to the betting info, Koreans wager multiple of} instances more than others card sharks. Thus, there 메리트카지노 is a frenzy among people for betting and half in} varied sorts of gambling membership or 카지노사이트 video games. Notwithstanding, presently their issues of betting can be facilitated with help of|the help of} developments, or suppose the advancement of growth.

    ReplyDelete

Post a Comment

Popular posts from this blog

Review of Pentester Academy - Attacking and Defending Active Directory Lab

Few months ago I didn't know what Active Directory is, and why should I care about it and never heard about ACL abuse and all. Although I had attended a BPAD (Breaking and Pwning Active Directory) training which was provided by Nullcon but I was not confident enough to go for this course exam, since my day-today activity involves VAPT stuffs related to Web/Network/Mobile and sometimes basic malware analysis (very basic one :p).  I started doing offshore lab and took help from some friends in understanding few Active Directory concepts. I did many silly mistakes during the lab and learned a lot. Meanwhile I registered for Active Directory Lab Course and got it in a discounted offer for first 50 students of about 11k INR  ( 1 mont lab access) :). Before wasting time any further let's dive into the review. The course -  https://www.pentesteracademy.com/activedirectorylab Certification - Certified Red Team Professional The Course Content  - After paying the course fee,

Backdoring PE files using code caves : OSCE/CTP Module 0x03 (OSCE Preparation)

Hello Readers, This post will cover Backdooring of P.E file by using code caves . There are already good tools to do this for you eg. Backdoor Factory and Shelter which will do the same job and even bypass some static analysis of few antiviruses . I will be covering the manual approach of backdooring a PE file . Let's understand some terms : [x] PE file : The Portable Executable (PE) format is a file format for executables, object code, and DLLs, used in 32-bit and 64-bit versions of Windows operating systems. [x] Code Cave : Wikipedia says - "A code cave is a series of null bytes in a process's memory. The code cave inside a process's memory is often a reference to a section of the code’s script functions that have capacity for the injection of custom instructions. For example, if a script’s memory allows for 5 bytes and only 3 bytes are used, then the remaining 2 bytes can be used to add external code to the script." [x] Shellcode : Wikipedia - &qu

Exit Shellcode x86

Exit in Assembly : For writing exit assembly program we need to check exit syscall reference number . I use this online man page : https://syscalls.kernelgrok.com / From above we can conclude that for exit system call we need 2 registers : [x] EAX => Eax should contain exit sys call number (0x01) [x] EBX => Ebx should contain  error code (0 for normal exit) A good shell-code : [x] Should be Null free [x] Smaller in length [x] Position Independent Below is my code : I wrote a small script to compile and assemble nasm program and extract the shellcode from it then saving the shellcode into a c file and compiling the new c program. Here is my script : Tweaked some instructions :p Next you can debug and check the execution in gdb by setting breakpoints and stepping instructions one by one . Below is my gdb console before calling interrupt int 0x80 showing the value of eax and ebx as expected :)