BADministration is a tool which interfaces with management or administration applications from an offensive standpoint.
It attempts to provide offsec personnel a tool with the ability to identify and leverage these non-technical vulnerabilities. As always: use for good, promote security, and fight application propagation.
Sorry for using python2.7, I found a lot of the vendor APIs would only run on 2.7 and I’m not experienced enough to mix and match python versions.
In my opinion, we often do a fantastic job of network segmentation and we’re starting to catch on with domain segmentation; however, one area I often see us fall down is application segmentation.
Application segmentation is similar to network segmentation in that we’re trying to reduce the exposure of a critical zone from a less trusted zone if it were to become exploited.
Administration applications often have privileged access to all its clients, if an attacker lands on that administration application there is a good chance all the clients can become exploited as well.
Application segmentation tries to ensure that server-to-client relationships don’t cross any trust boundaries. For example, if your admin network is trust level 100 and it’s administered by your NMS server, your NMS server should be considered trust level 100.
Also Read – SET : The Social-Engineer Toolkit Repository From TrustedSec
Installation
There will be a collection of python scripts, exes, and who knows what; for the central python module it’s pretty simple
pip install -r requirements.txt
The ePO Endpoint Deployment Kit (EEDK) creates some sort of signed zip file which can be uploaded to ePO. A client task can be created leveraging the zip file, giving privileged access to ePO clients. EEDK requires msvcp71.dll to run which is an old runtime library which can be found in the .NET Framework SDK Version 1.1.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…