Network Penetration Testing – Telegram
Network Penetration Testing
1.03K subscribers
40 photos
3 videos
12 files
269 links
[ Network Penetration Testing & Cloud ]

Any misuse of this info will not be the responsibility of the author, educational purposes only.


@NetPentester
Download Telegram
​​BARK

BARK stands for BloodHound Attack Research Kit. It is a PowerShell noscript built to assist the BloodHound Enterprise team with researching and continuously validating abuse primitives. BARK currently focuses on Microsoft's Azure suite of products and services.

BARK requires no third party dependencies. BARK's functions are designed to be as simple and maintainable as possible. Most functions are very simple wrappers for making requests to various REST API endpoints. BARK's basic functions do not even require each other - you can pull almost any BARK function out of BARK and it will work perfectly as a standalone function in your own noscripts.

https://github.com/BloodHoundAD/BARK
#AD
@NetPentesters
Friends, if you have any questions about network penetration testing, contact us with the following bot:
@ChatNPTbot
Autobloody

Automatically exploit Active Directory privilege escalation paths shown by BloodHound combining pathgen.py and autobloody.py.

Here is the list of the BloodHound edges currently supported for automatic exploitation:

MemberOf
ForceChangePassword
AddMembers
AddSelf
DCSync
GetChanges/GetChangesAll
GenericAll
WriteDacl
GenericWrite
WriteOwner
Owns
Contains
AllExtendedRights



https://github.com/CravateRouge/autobloody
#ad
#bloodhound
@NetPentesters
PowerHuntShares
is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.
It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.

https://github.com/NetSPI/PowerHuntShares


Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments

https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares

#ad
#SMB
@NetPentesters
​​ADDS_Tool

Active Directory Domain Services Tool.

Windows Command shell program that is a wrapper for ADDS toolset: - DSQUERY - DSGET - DSADD - DSMOD - DSMOVE

Features:
▫️ Main Menu
▫️ Settings Menu
▫️ Logs
▫️ Search Universal
▫️ Search User
▫️ Search Group
▫️ Search Computer
▫️ Search Server
▫️ Search OU

https://github.com/DavidGeeraerts/ADDS_Tool

#ad
#tools
@NetPentesters
Systematization of attacks on the perimeter of L2/L3 network equipment. Ver. 2.0.
#attack
#Analytics
@NetPentesters
​​LDAP Monitor

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object

https://github.com/p0dalirius/LDAPmonitor

#ldap
@NetPentesters
​​PowerHuntShares

PowerHuntShares is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.

It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation efforts at scale.

https://github.com/NetSPI/PowerHuntShares

Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
#AD
#SMB
#BlueTeam
@NetPentesters
Have a look at all the signed PowerShell noscripts located in C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\

Some of these can execute code and do all kind of interesting stuff.

https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts
#ps
#signed
#redteam
@NetPentesters