BADministration is a tool which interfaces with management or administration applications from an offensive standpoint.
It attempts to provide offsec personnel a tool with the ability to identify and leverage these non-technical vulnerabilities. As always: use for good, promote security, and fight application propagation.
Sorry for using python2.7, I found a lot of the vendor APIs would only run on 2.7 and I’m not experienced enough to mix and match python versions.
In my opinion, we often do a fantastic job of network segmentation and we’re starting to catch on with domain segmentation; however, one area I often see us fall down is application segmentation.
Application segmentation is similar to network segmentation in that we’re trying to reduce the exposure of a critical zone from a less trusted zone if it were to become exploited.
Administration applications often have privileged access to all its clients, if an attacker lands on that administration application there is a good chance all the clients can become exploited as well.
Application segmentation tries to ensure that server-to-client relationships don’t cross any trust boundaries. For example, if your admin network is trust level 100 and it’s administered by your NMS server, your NMS server should be considered trust level 100.
There will be a collection of python scripts, exes, and who knows what; for the central python module it’s pretty simple
pip install -r requirements.txt
- solarwinds-enum – Module used to enumerate clients of Orion
- solarwinds-listalerts – Lists Orion alerts and draws attention to malicious BADministration alerts
- solarwinds-alertremove – Removes the malicious alert
- solarwinds-syscmd – Executes a system command on the Orion server via malicious alert
- Standalone x64 4.5 .NET BADministration_SWDump.exe – Scrapes memory for WMI credentials used by Orion.
- Can consume large amounts of memory, use at your own risk
- Compile me as x64
- mcafee-enum – Module used to enumerate clients of ePO
- mcafee-listpackages – Lists all ePO deployment packages
- mcafee-removepackage – Removes ePO deployment packages
- mcafee-uploadpackage – Uploads package created with McAfee ePO Endpoint Deployment Toolkit (EEDK)
- mcafee-createtask – Creates client task using deployment package
- mcafee-remotetask – Removes target client task
- mcafee-listtasks – Lists all client tasks
- mcafee-runtask – Runs target client deployment task
The ePO Endpoint Deployment Kit (EEDK) creates some sort of signed zip file which can be uploaded to ePO. A client task can be created leveraging the zip file, giving privileged access to ePO clients. EEDK requires msvcp71.dll to run which is an old runtime library which can be found in the .NET Framework SDK Version 1.1.
- EEDK Download – https://community.mcafee.com/t5/Documents/ePO-Endpoint-Deployment-Kit-9-6-1-Enterprise-Edition/ta-p/553541
- Microsoft .NET Framework SDK Version 1.1 – https://www.microsoft.com/en-ca/download/details.aspx?id=16217