SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO



Similar documents
WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS

CommVault Simpana Archive 8.0 Integration Guide

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Creating and Managing Shared Folders

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference

Activity 1: Scanning with Windows Defender

Windows Server 2008/2012 Server Hardening

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Web. Security Options Comparison

EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL

Using NFS v4 ACLs with Samba in a multiprotocol environment

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Common Internet File System

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Manual Password Depot Server 8

NetWrix File Server Change Reporter. Quick Start Guide

SAS 9.3 Foundation for Microsoft Windows

Setting Up Scan to SMB on TaskALFA series MFP s.

Disk Encryption. Aaron Howard IT Security Office

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

Using Logon Agent for Transparent User Identification

NETWRIX FILE SERVER CHANGE REPORTER

IBM EXAM - C IBM Security QRadar SIEM V7.1 Implementation.

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

File sharing in Windows XP

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

Winchester Systems. White Paper

Windows Offline Files

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt 31/03/ L Wyatt Update to procedure

Security Explorer 9.5. User Guide

A Roadmap for Securing IIS 5.0

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Securing Active Directory Correctly

ChangeAuditor 5.5. For Active Directory Event Reference Guide

Pro Bundle Evaluator s Guide Software Pursuits, Inc.

WINDOWS 7 & HOMEGROUP

This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.

SplendidCRM Deployment Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Computer Security: Principles and Practice

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Global TAC Secure FTP Site Customer User Guide

Plunder Pillage & Print

AccuGuard Desktop and AccuGuard Server User Guide

Setting Up Your FTP Server

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00

Configuring MailArchiva with Insight Server

<Samba status report>

AVG Business SSO Partner Getting Started Guide

Internal Penetration Test

Google Apps and Open Directory. Randy Saeks

User Guide - escan for Linux File Server

Creating Home Directories for Windows and Macintosh Computers

IBM WebSphere Application Server Version 7.0

MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand

The Win32 Network Management APIs

How To - Implement Single Sign On Authentication with Active Directory

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

embeo Getting Started and Samples

MailEnable Connector for Microsoft Outlook

Eylean server deployment guide

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Discovery Guide. Secret Server. Table of Contents

IIS Easy Migration Tool - Quick Start Guide

Vector HelpDesk - Administrator s Guide

RemoteLab 2.0 Admin Guide

Security. TestOut Modules

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

SecureVault Online Backup Service FAQ

ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES

Exploiting Transparent User Identification Systems

Coveo Platform 7.0. Microsoft Active Directory Connector Guide

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

How to Set-up Microsoft Outlook to Connect to your Arrowmail Exchange Mailbox

Backing Up TestTrack Native Project Databases

Lecture 3: Active Directory Domain Service (AD DS)

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Actuality of SMBRelay in Modern Windows Networks

Installation Instruction STATISTICA Enterprise Server

Security Guidelines for MapInfo Discovery 1.1

Other documents in this series are available at: servernotes.wazmac.com

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

File Management Utility User Guide

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell

PERMISSION ANALYZER USER MANUAL

ServletExec TM 6.0 Installation Guide. for Microsoft Internet Information Server SunONE Web Server Sun Java System Web Server and Apache HTTP Server

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

Advanced Event Viewer Manual

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

Using SQL Reporting Services with Amicus

Installation Notes for Outpost Network Security (ONS) version 3.2

Transcription:

SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO Lucas Morris Michael McAtee @lucasjmorris @michael.mcatee

About Us Lucas Morris Manager at Crowe Horwath LLP Manager, Pentester, Code Monkey Michael McAtee Senior Consultant at Crowe Horwath LLP Pentester, SysAdmin, [something funny here]

About Us Lucas Morris => emperorcow@gmail.com => @lucasjmorris => github.com/emperorcow Michael McAtee => jmmcatee@gmail.com => @michaelmcatee => github.com/jmmcatee https://github.com/emperorcow/shareenum

Overview SMB / CIFS Refresher Windows Permissions Refresher (DACLs, SDDL, ACEs, etc.) The Problem With Scanning Today What Share Scanning Is Good For Tools!

Windows File Sharing CIFS Basically SMB 1.0 SMB Mostly open & is the published spec that others implement to SMB 1.0: Windows XP, Server 2003 R2, & Prior SMB 2.0: Windows Vista, Server 2008, & Above SMB 2.1: Windows 7, Server 2008 R2, & Above SMB 3.0: Windows 8, Server 2012, & Above SMB 3.02: Windows 8.1, Server 2012 R2

Types of Shares Special Types of Shares (IPC$, ADMIN$, C$) $ = Hidden usually IPC$ = InterProcess Communication ADMIN$ = C:\Windows\System32 C$, D$, etc. = Drive Shares These are default an rarely removed Although you can disable them (http://support.microsoft.com/kb/954422)

Shares - Permissions Discretionary Access Control List (DACL) REVISION:1,OWNER:2K8-WIN7-01\ShareEnumUser1, GROUP:PROD\Domain Users, ACL:2K8\shareenumdomuser1:0/16/0x001f01ff Access Control Entry (ACE) BUILTIN\Administrators:0/0/0x001f01ff

Shares - Permissions Shares Read View files & folders View files & folder contents Change Add files & folders Change data in files Delete folders and files Full Control Change NTFS permissions

Shares - Permissions NTFS Full Control Modify Read & Execute List Folder Contents Read Write Special Permissions

Shares - Permissions Special Permissions Traverse Folder/Execute File List Folder/Read Data Read Attributes Read Extended Attributes Create Files/Write Data Create Folders/Append Data Write Attributes Write Extended Attributes Delete Subfolders and Files Delete Read Permissions Change Permissions Take Ownership

Shares - Permissions Attributes READONLY HIDDEN SYSTEM ARCHIVE TEMPORARY COMPRESSED (Directory Only) OFFLINE NOT_CONTENT_INDEXED Extended Attributes Custom and starting to be used in Windows 8

Shares - Permissions Access Masks Generic Access Rights Standard Access Rights File and Directory Access Rights DOS Mode Flags: Read Only, Hidden

The Problem Share scanning can be a pentester s best friend But Current tools have a variety of issues Does not support all authentication mechanisms (NTLMv2 & NTLMSSP) Can be very noisy, get us caught S L O W Only pulls information at the top level of the share

Why We Scan Shares Sensitive Data (Obviously!) \HR \IT \Backups \Source System Fingerprinting What kind of shares does this system have? What does that tell me about the system?

Why We Scan Shares Recon NETLOGON & SYSVOL Windows Deployment Services Images and Credentials

Why We Scan Shares Credential Reuse Is the local administrator password reused? Do all systems have their local administrator renamed to AdminWhatAdmin and have the same password? Does the local ITHelpDesk account exist everywhere with a password we ve found?

Why We Scan Shares Local Administrator Access Where Do I Have Admin on a box? Does Domain Users have Admin somewhere? What about a single user?

Share Scanning Tools Nmap NSE (smb-enum-shares) SysInternal s ShareEnum Nessus Metasploit SMBClient WinShareEnum (github.com/nccgroup/winshareenum) Manually though explorer or net use

Our Tool Why implement our own protocols, someone else already has Samba. We re using the same libraries as smbclient, but its much faster to go native than parse command line output. Supports the same authentication methods that Samba does (NTLMv2 & NTLMSSP!)

Our Tool Gathers DACLs and parses ACEs for each object Able to recursively load subdirectories and files CSV output so you can filter easily Supports Anonymous, Regular Creds, and Pass the Hash

Demo Or a video of a demo Demo 1: Local Administrator Password Reuse Demo 2: Sensitive Shares Demo 3: Recursively enumerating a share https://www.github.com/emperorcow/shareenum

Questions? Also, if you know about the Samba RPC and IDL code, we d love to buy you a beer.

The End Lucas Morris => emperorcow@gmail.com => @lucasjmorris => github.com/emperorcow Michael McAtee => jmmcatee@gmail.com => @michaelmcatee => github.com/jmmcatee https://github.com/emperorcow/shareenum