Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Hackndo/WebclientServiceScanner
Python tool to Check running WebClient services on multiple targets based on @leechristensen
https://github.com/Hackndo/WebclientServiceScanner
Last synced: 22 days ago
JSON representation
Python tool to Check running WebClient services on multiple targets based on @leechristensen
- Host: GitHub
- URL: https://github.com/Hackndo/WebclientServiceScanner
- Owner: Hackndo
- License: mit
- Created: 2021-07-31T10:01:18.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2021-08-18T06:23:39.000Z (over 3 years ago)
- Last Synced: 2024-11-15T05:02:36.483Z (28 days ago)
- Language: Python
- Homepage:
- Size: 29.3 KB
- Stars: 252
- Watchers: 5
- Forks: 25
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Hackndo/WebclientServiceScanner - Python tool to Check running WebClient services on multiple targets based on @leechristensen (Python)
README
# WebClient Service Scanner
![Example](https://raw.githubusercontent.com/Hackndo/WebclientServiceScanner/master/assets/demo.png)
Python tool to Check running WebClient services on multiple targets based on [@tifkin_ idea](https://twitter.com/tifkin_/status/1419806476353298442).
This tool uses [impacket](https://github.com/SecureAuthCorp/impacket) project.
### Usage
```bash
webclientservicescanner hackn.lab/user:[email protected]/24
```Provided credentials will be tested against a domain controller before scanning so that a typo in the domain/username/password won't lock out the account. If you want to bypass this check, just use `-no-validation` flag.
### Exploitation
Green entries mean that WebDav client is active on remote host. Using [PetitPotam](https://github.com/topotam/PetitPotam) or [PrinterBug](https://github.com/dirkjanm/krbrelayx/blob/master/printerbug.py), an HTTP authentication can be coerced and relayed to LDAP(S) on domain controllers. This relay can use [RBCD](https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html) or [KeyCredentialLink](https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab) abuse to compromise relayed host.
For more info about relaying, you can check out https://en.hackndo.com/ntlm-relay/