zBang – Privileged Account Threat Detection Tool
2020-04-01 00:20:31 Author: www.darknet.org.uk(查看原文) 阅读量:221 收藏

Last updated: April 1, 2020 | 5,153 views


zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations and red teamers can utilize zBang to identify potential attack vectors and improve the security posture of the network.

zBang -  Privileged Account Threat Detection Tool

The results can be analyzed with the graphic interface or by reviewing the raw output files.

The tool is built from five different scanning modules:

  • ACLight scan – discovers the most privileged accounts that must be protected, including suspicious Shadow Admins.
  • Skeleton Key scan – discovers Domain Controllers that might be infected by Skeleton Key malware.
  • SID History scan – discovers hidden privileges in domain accounts with secondary SID (SID History attribute).
  • RiskySPNs scan – discovers risky configuration of SPNs that might lead to credential theft of Domain Admins
  • Mystique scan – discovers risky Kerberos delegation configuration in the network.

Requirements to run zBang Privileged Account Threat Detection Tool

  1. Run it with any domain user. The scans do not require any extra privileges; the tool performs read-only LDAP queries to the DC.
  2. Run the tool from a domain joined machine (a Windows machine).
  3. PowerShell version 3 or above and .NET 4.5 (it comes by default in Windows 8/2012 and above).

zBang Privileged Account Threat Detection Tool Performance

zBang runs quickly and doesn’t need any special privileges over the network. As the only communication required is to the domain controller through legitimate read-only LDAP queries, a typical execution time of zBang on a network with around 1,000 user accounts will be seven minutes.

When you intend to scan large networks with multiple trust-connected domains, it’s recommended to check the domain trusts configuration or run zBang separately from within each domain to avoid possible permission and connectivity issues.

You can download zBang here:

zBang-v1.00.exe
zBang-source-v1.00.zip

Or read more here.

Posted in: Hacking Tools

Latest Posts:


trident - Automated Password Spraying Tool trident – Automated Password Spraying Tool
The Trident project is an automated password spraying tool developed to be deployed on multiple cloud providers and provides advanced options around scheduling

October 7, 2020 - 46 Shares

tko-subs - Detect & Takeover Subdomains With Dead DNS Records tko-subs – Detect & Takeover Subdomains With Dead DNS Records
tko-subs is a tool that helps you to detect & takeover subdomains with dead DNS records, this could be dangling CNAMEs point to hosting services and more.

September 24, 2020 - 101 Shares

Arcane - Tool To Backdoor iOS Packages (iPhone ARM) Arcane – Tool To Backdoor iOS Packages (iPhone ARM)
Arcane is a simple script tool to backdoor iOS packages (iPhone ARM) and create the necessary resources for APT repositories.

August 17, 2020 - 226 Shares

SharpHose - Asynchronous Password Spraying Tool SharpHose – Asynchronous Password Spraying Tool
SharpHose is an asynchronous password spraying tool in C# for Windows environments that takes into consideration fine-grained password policies and can be run over Cobalt Strike's execute-assembly.

July 27, 2020 - 241 Shares

Axiom - Pen-Testing Server For Collecting Bug Bounties Axiom – Pen-Testing Server For Collecting Bug Bounties
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty, basically a pen-testing server out of the box with 1-line.

July 7, 2020 - 354 Shares

Quasar RAT - Windows Remote Administration Tool Quasar RAT – Windows Remote Administration Tool
Quasar is a fast and light-weight Windows remote administration tool coded in C#. Used for user support through day-to-day administrative work to monitoring.

May 28, 2020 - 515 Shares



文章来源: https://www.darknet.org.uk/2020/03/zbang-privileged-account-threat-detection-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed
如有侵权请联系:admin#unsafe.sh