Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/Hackndo/WebclientServiceScanner

Python tool to Check running WebClient services on multiple targets based on @leechristensen
https://github.com/Hackndo/WebclientServiceScanner

Last synced: 22 days ago
JSON representation

Python tool to Check running WebClient services on multiple targets based on @leechristensen

Awesome Lists containing this project

README

        

# WebClient Service Scanner

![Example](https://raw.githubusercontent.com/Hackndo/WebclientServiceScanner/master/assets/demo.png)

Python tool to Check running WebClient services on multiple targets based on [@tifkin_ idea](https://twitter.com/tifkin_/status/1419806476353298442).

This tool uses [impacket](https://github.com/SecureAuthCorp/impacket) project.

### Usage

```bash
webclientservicescanner hackn.lab/user:[email protected]/24
```

Provided credentials will be tested against a domain controller before scanning so that a typo in the domain/username/password won't lock out the account. If you want to bypass this check, just use `-no-validation` flag.

### Exploitation

Green entries mean that WebDav client is active on remote host. Using [PetitPotam](https://github.com/topotam/PetitPotam) or [PrinterBug](https://github.com/dirkjanm/krbrelayx/blob/master/printerbug.py), an HTTP authentication can be coerced and relayed to LDAP(S) on domain controllers. This relay can use [RBCD](https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html) or [KeyCredentialLink](https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab) abuse to compromise relayed host.

For more info about relaying, you can check out https://en.hackndo.com/ntlm-relay/