Discover and explore top open-source AI tools and projects—updated daily.
PowerShell tool for Active Directory SMB share auditing
Top 40.9% on SourcePulse
PowerHuntShares is a PowerShell auditing script designed for cybersecurity professionals and penetration testers to identify, analyze, and report on excessive privileges associated with SMB shares in Active Directory environments. It automates the discovery of accessible systems, enumerates SMB share ACLs, and analyzes them for excessive permissions, providing detailed HTML and CSV reports.
How It Works
The tool leverages PowerShell to interact with Active Directory and SMB shares. It begins by discovering domain-joined computers, filtering them based on network accessibility (ping and open SMB port 445). For each accessible system, it enumerates SMB shares and their Access Control Lists (ACLs). The script then analyzes these ACLs to identify "excessive privileges," defined by explicit ACEs for groups like "Everyone," "Authenticated Users," "Domain Users," and "Domain Computers," as well as "high risk" shares like wwwroot
or admin$
.
Quick Start & Requirements
PowerHuntShares.psm1
module into your PowerShell session using Import-Module
or IEX (New-Object System.Net.WebClient).DownloadString(...)
.Highlighted Details
Maintenance & Community
The project is maintained by NetSPI. Key contributors include Scott Sutherland (@_nullbind). The project utilizes open-source code from PowerSploit and Invoke-Parallel.
Licensing & Compatibility
Limitations & Caveats
BUILTIN\Users
may incorrectly appear as LocalSystem
and be excluded from excessive privilege exports.print$
, sysvol
) may need configuration adjustments for specific environments.4 months ago
Inactive