Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nccgroup/windowsdaclenumproject
A collection of tools to enumerate and analyse Windows DACLs
https://github.com/nccgroup/windowsdaclenumproject
Last synced: 3 months ago
JSON representation
A collection of tools to enumerate and analyse Windows DACLs
- Host: GitHub
- URL: https://github.com/nccgroup/windowsdaclenumproject
- Owner: nccgroup
- License: agpl-3.0
- Created: 2013-10-09T06:25:43.000Z (about 11 years ago)
- Default Branch: master
- Last Pushed: 2015-07-11T13:26:57.000Z (over 9 years ago)
- Last Synced: 2024-05-09T10:59:50.945Z (6 months ago)
- Language: C++
- Size: 390 KB
- Stars: 107
- Watchers: 17
- Forks: 45
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-collection - **70**星
README
Windows DACL Enum Project
======================A collection of tools to enumerate and analyse Windows DACLs
Released as open source by NCC Group Plc - http://www.nccgroup.com/
Developed by Ollie Whitehouse, ollie dot whitehouse at nccgroup dot com
https://github.com/nccgroup/WindowsDACLEnumProject
Released under AGPL see LICENSE for more information
Overview of Windows DACLs and ACEs
-------------
Read - http://msdn.microsoft.com/en-us/library/windows/desktop/aa446597(v=vs.85).aspxTool #1: Process Perms
-------------###### Features
The first tool released as part of this project. Will enumerate:
* Processes and the integrity level and user they are running as.
* Optionally: the DACLs associated with the process object.
* Optionally: the threads for a process and the DACLs associated with them.
* Optionally: The modules loaded by a process
* Optionally: Exclude non mapped SIDs from the outputThe tool will automatically flag any suspicious DACLs.
###### Command Line Options
The command line take the following options:
* -p Process permissions
* -m Modules
* -t Threads and permissions
* -o [PID]
* -x exclude non mapped SIDs from alerts###### Typical Usage
Typical usage will be with a command line such as:
processperms -pxThe tool is designed for Windows Vista / Server 2008 and higher due to integrity level awareness.
###### Screenshot
=======
Designed for Windows Vista / Server 2008 and higher due to integrity level awareness.![ScreenShot](https://raw.github.com/nccgroup/WindowsDACLEnumProject/master/screenshots/processandthread.png)
Tool #2: Window Stations and Desktops
-------------###### Features
The second tool released as part of this project. Will enumerate:
* Window Stations within the session that it is executed and the associated DACL
* Desktops within those Window Stations and the associated DACLsTool #3: Services
-------------###### Features
The third tool released as part of this project. Will enumerate:
* Services including kernel drivers, filter drivers and user land services.
* DACLs associated with the service entries in the service control manager.
* Service status, PID, binary path.
* DACLs associated with with the binaries associated
* Flag obviously weak DACLsTool #4: File System
-------------###### Features
The fourth tool released as part of this project. Will enumerate:
* Files and access control lists
* Directories and access control lists
* Alert on files or directories with access control which appear weakTool #5: Registry
-------------###### Features
The fifth tool released as part of this project. Will enumerate:
* Registry keys and access control lists
* Alert on keys with access control which appear weak
* -s parameter to exclude all but the most suspicious output (see -h).
* -x paramater to only alert on suspicious output (see -h).