diff options
author | bitform <matt@exploit-monday.com> | 2013-01-21 08:33:51 -0500 |
---|---|---|
committer | bitform <matt@exploit-monday.com> | 2013-01-21 08:33:51 -0500 |
commit | 40eb187bca6a985ce7d24b19ac54c47ade285858 (patch) | |
tree | 1c3254a0eb82a9595690fed0900075044356252b /Recon | |
parent | 46aead39c6f8d04b00b3c3f2aad10b7948aa003f (diff) | |
download | PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.tar.gz PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.zip |
Consistency improvements in comment-based help
Diffstat (limited to 'Recon')
-rw-r--r-- | Recon/Get-GPPPassword.ps1 | 40 | ||||
-rw-r--r-- | Recon/Get-HttpStatus.ps1 | 41 | ||||
-rw-r--r-- | Recon/Invoke-ReverseDnsLookup.ps1 | 86 |
3 files changed, 99 insertions, 68 deletions
diff --git a/Recon/Get-GPPPassword.ps1 b/Recon/Get-GPPPassword.ps1 index 99a694b..b22fb74 100644 --- a/Recon/Get-GPPPassword.ps1 +++ b/Recon/Get-GPPPassword.ps1 @@ -1,31 +1,39 @@ -function Get-GPPPassword {
-
+function Get-GPPPassword
+{
<#
-.Synopsis
+.SYNOPSIS
+
+Retrieves the plaintext password for accounts pushed through Group Policy in groups.xml.
- Get-GPPPassword retrieves the plaintext password for accounts pushed through Group Policy in groups.xml.
- Author: Chris Campbell (@obscuresec)
- License: BSD 3-Clause
+PowerSploit Function: Get-GPPPassword
+Author: Chris Campbell (@obscuresec)
+License: BSD 3-Clause
+Required Dependencies: None
+Optional Dependencies: None
-.Description
+.DESCRIPTION
- Get-GPPPassword imports the encoded and encrypted password string from groups.xml and then decodes and decrypts the plaintext password.
+Get-GPPPassword imports the encoded and encrypted password string from groups.xml and then decodes and decrypts the plaintext password.
-.Parameter Path
+.PARAMETER Path
- The path to the targeted groups.xml file.
+The path to the targeted groups.xml file.
-.Example
+.EXAMPLE
- Get-GPPPassword -path c:\demo\groups.xml
+Get-GPPPassword -path c:\demo\groups.xml
-.Link
+.LINK
- http://esec-pentest.sogeti.com/exploiting-windows-2008-group-policy-preferences
- http://www.obscuresecurity.blogspot.com/2012/05/gpp-password-retrieval-with-powershell.html
+http://esec-pentest.sogeti.com/exploiting-windows-2008-group-policy-preferences
+http://www.obscuresecurity.blogspot.com/2012/05/gpp-password-retrieval-with-powershell.html
#>
-Param ( [Parameter(Position = 0, Mandatory = $True)] [String] $Path = "$PWD\groups.xml" )
+ Param (
+ [Parameter(Position = 0, Mandatory = $True)]
+ [String]
+ $Path = "$PWD\groups.xml"
+ )
#Function to pull encrypted password string from groups.xml
function Parse-cPassword {
diff --git a/Recon/Get-HttpStatus.ps1 b/Recon/Get-HttpStatus.ps1 index 2f4b343..fde3d26 100644 --- a/Recon/Get-HttpStatus.ps1 +++ b/Recon/Get-HttpStatus.ps1 @@ -1,47 +1,68 @@ -function Get-HttpStatus {
+function Get-HttpStatus
+{
<#
.SYNOPSIS
-PowerSploit Module - Get-HttpStatus
Returns the HTTP Status Codes and full URL for specified paths.
+PowerSploit Function: Get-HttpStatus
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
+Required Dependencies: None
+Optional Dependencies: None
.DESCRIPTION
+
A script to check for the existence of a path or file on a webserver.
.PARAMETER Target
+
Specifies the remote web host either by IP or hostname.
.PARAMETER Path
+
Specifies the remost host.
.PARAMETER Port
+
Specifies the port to connect to.
.PARAMETER UseSSL
+
Use an SSL connection.
.EXAMPLE
-PS > Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt | Select-Object {where StatusCode -eq 20*}
+
+C:\PS> Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt | Select-Object {where StatusCode -eq 20*}
.EXAMPLE
-PS > Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt -UseSSL
+
+C:\PS> Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt -UseSSL
.NOTES
-HTTP Codes: 100 - Informational * 200 - Success * 300 - Redirection * 400 - Client Error * 500 - Server Error
-Status Codes: http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
+
+HTTP Status Codes: 100 - Informational * 200 - Success * 300 - Redirection * 400 - Client Error * 500 - Server Error
.LINK
+
http://obscuresecurity.blogspot.com
+http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
#>
[CmdletBinding()] Param(
- [Parameter(Mandatory = $True)] [String] $Target,
- [Parameter()] [String] [ValidateNotNullOrEmpty()] $Path = '.\Dictionaries\admin.txt',
- [Parameter()] [Int] $Port,
- [Parameter()] [Switch] $UseSSL
+ [Parameter(Mandatory = $True)]
+ [String]
+ $Target,
+
+ [String]
+ [ValidateNotNullOrEmpty()]
+ $Path = '.\Dictionaries\admin.txt',
+
+ [Int]
+ $Port,
+
+ [Switch]
+ $UseSSL
)
if (Test-Path $Path) {
diff --git a/Recon/Invoke-ReverseDnsLookup.ps1 b/Recon/Invoke-ReverseDnsLookup.ps1 index af45f2e..1346ae6 100644 --- a/Recon/Invoke-ReverseDnsLookup.ps1 +++ b/Recon/Invoke-ReverseDnsLookup.ps1 @@ -1,64 +1,66 @@ function Invoke-ReverseDnsLookup
{
-
<#
-.Synopsis
+.SYNOPSIS
+
+Perform a reverse DNS lookup scan on a range of IP addresses.
- PowerSploit Module - Invoke-ReverseDnsLookup
- Author: Matthew Graeber (@mattifestation)
- License: BSD 3-Clause
+PowerSploit Function: Invoke-ReverseDnsLookup
+Author: Matthew Graeber (@mattifestation)
+License: BSD 3-Clause
+Required Dependencies: None
+Optional Dependencies: None
-.Description
+.DESCRIPTION
- Invoke-ReverseDnsLookup scans an IP address range for DNS PTR records. This script
- is useful for performing DNS reconnaisance prior to conducting an authorized
- penetration test.
+Invoke-ReverseDnsLookup scans an IP address range for DNS PTR records. This script is useful for performing DNS reconnaisance prior to conducting an authorized penetration test.
-.Parameter IPRange
+.PARAMETER IPRange
- Specifies the IP address range. The range provided can be in the form of a single
- IP address, a low-high range, or a CIDR range. Comma-delimited ranges may can be
- provided.
+Specifies the IP address range. The range provided can be in the form of a single IP address, a low-high range, or a CIDR range. Comma-delimited ranges may can be provided.
-.Example
+.EXAMPLE
- PS> Invoke-ReverseDnsLookup 74.125.228.0/29
+C:\PS> Invoke-ReverseDnsLookup 74.125.228.0/29
- IP HostName
- -- --------
- 74.125.228.1 iad23s05-in-f1.1e100.net
- 74.125.228.2 iad23s05-in-f2.1e100.net
- 74.125.228.3 iad23s05-in-f3.1e100.net
- 74.125.228.4 iad23s05-in-f4.1e100.net
- 74.125.228.5 iad23s05-in-f5.1e100.net
- 74.125.228.6 iad23s05-in-f6.1e100.net
+IP HostName
+-- --------
+74.125.228.1 iad23s05-in-f1.1e100.net
+74.125.228.2 iad23s05-in-f2.1e100.net
+74.125.228.3 iad23s05-in-f3.1e100.net
+74.125.228.4 iad23s05-in-f4.1e100.net
+74.125.228.5 iad23s05-in-f5.1e100.net
+74.125.228.6 iad23s05-in-f6.1e100.net
- Description
- -----------
- Returns the hostnames of the IP addresses specified by the CIDR range.
+Description
+-----------
+Returns the hostnames of the IP addresses specified by the CIDR range.
-.Example
+.EXAMPLE
- PS> Invoke-ReverseDnsLookup '74.125.228.1,74.125.228.4-74.125.228.6'
-
- IP HostName
- -- --------
- 74.125.228.1 iad23s05-in-f1.1e100.net
- 74.125.228.4 iad23s05-in-f4.1e100.net
- 74.125.228.5 iad23s05-in-f5.1e100.net
- 74.125.228.6 iad23s05-in-f6.1e100.net
-
- Description
- -----------
- Returns the hostnames of the IP addresses specified by the IP range specified.
+C:\PS> Invoke-ReverseDnsLookup '74.125.228.1,74.125.228.4-74.125.228.6'
+IP HostName
+-- --------
+74.125.228.1 iad23s05-in-f1.1e100.net
+74.125.228.4 iad23s05-in-f4.1e100.net
+74.125.228.5 iad23s05-in-f5.1e100.net
+74.125.228.6 iad23s05-in-f6.1e100.net
-.Link
+Description
+-----------
+Returns the hostnames of the IP addresses specified by the IP range specified.
+
+.LINK
- My blog: http://www.exploit-monday.com
+http://www.exploit-monday.com
#>
-Param( [Parameter(Position = 0, Mandatory = $True)] [String] $IpRange )
+ Param (
+ [Parameter(Position = 0, Mandatory = $True)]
+ [String]
+ $IpRange
+ )
function Parse-IPList ([String] $IpRange)
{
|