From 40eb187bca6a985ce7d24b19ac54c47ade285858 Mon Sep 17 00:00:00 2001 From: bitform Date: Mon, 21 Jan 2013 08:33:51 -0500 Subject: Consistency improvements in comment-based help --- Recon/Get-GPPPassword.ps1 | 40 ++++++++++-------- Recon/Get-HttpStatus.ps1 | 41 ++++++++++++++----- Recon/Invoke-ReverseDnsLookup.ps1 | 86 ++++++++++++++++++++------------------- 3 files changed, 99 insertions(+), 68 deletions(-) (limited to 'Recon') diff --git a/Recon/Get-GPPPassword.ps1 b/Recon/Get-GPPPassword.ps1 index 99a694b..b22fb74 100644 --- a/Recon/Get-GPPPassword.ps1 +++ b/Recon/Get-GPPPassword.ps1 @@ -1,31 +1,39 @@ -function Get-GPPPassword { - +function Get-GPPPassword +{ <# -.Synopsis +.SYNOPSIS + +Retrieves the plaintext password for accounts pushed through Group Policy in groups.xml. - Get-GPPPassword retrieves the plaintext password for accounts pushed through Group Policy in groups.xml. - Author: Chris Campbell (@obscuresec) - License: BSD 3-Clause +PowerSploit Function: Get-GPPPassword +Author: Chris Campbell (@obscuresec) +License: BSD 3-Clause +Required Dependencies: None +Optional Dependencies: None -.Description +.DESCRIPTION - Get-GPPPassword imports the encoded and encrypted password string from groups.xml and then decodes and decrypts the plaintext password. +Get-GPPPassword imports the encoded and encrypted password string from groups.xml and then decodes and decrypts the plaintext password. -.Parameter Path +.PARAMETER Path - The path to the targeted groups.xml file. +The path to the targeted groups.xml file. -.Example +.EXAMPLE - Get-GPPPassword -path c:\demo\groups.xml +Get-GPPPassword -path c:\demo\groups.xml -.Link +.LINK - http://esec-pentest.sogeti.com/exploiting-windows-2008-group-policy-preferences - http://www.obscuresecurity.blogspot.com/2012/05/gpp-password-retrieval-with-powershell.html +http://esec-pentest.sogeti.com/exploiting-windows-2008-group-policy-preferences +http://www.obscuresecurity.blogspot.com/2012/05/gpp-password-retrieval-with-powershell.html #> -Param ( [Parameter(Position = 0, Mandatory = $True)] [String] $Path = "$PWD\groups.xml" ) + Param ( + [Parameter(Position = 0, Mandatory = $True)] + [String] + $Path = "$PWD\groups.xml" + ) #Function to pull encrypted password string from groups.xml function Parse-cPassword { diff --git a/Recon/Get-HttpStatus.ps1 b/Recon/Get-HttpStatus.ps1 index 2f4b343..fde3d26 100644 --- a/Recon/Get-HttpStatus.ps1 +++ b/Recon/Get-HttpStatus.ps1 @@ -1,47 +1,68 @@ -function Get-HttpStatus { +function Get-HttpStatus +{ <# .SYNOPSIS -PowerSploit Module - Get-HttpStatus Returns the HTTP Status Codes and full URL for specified paths. +PowerSploit Function: Get-HttpStatus Author: Chris Campbell (@obscuresec) License: BSD 3-Clause +Required Dependencies: None +Optional Dependencies: None .DESCRIPTION + A script to check for the existence of a path or file on a webserver. .PARAMETER Target + Specifies the remote web host either by IP or hostname. .PARAMETER Path + Specifies the remost host. .PARAMETER Port + Specifies the port to connect to. .PARAMETER UseSSL + Use an SSL connection. .EXAMPLE -PS > Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt | Select-Object {where StatusCode -eq 20*} + +C:\PS> Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt | Select-Object {where StatusCode -eq 20*} .EXAMPLE -PS > Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt -UseSSL + +C:\PS> Get-HttpStatus -Target www.example.com -Path c:\dictionary.txt -UseSSL .NOTES -HTTP Codes: 100 - Informational * 200 - Success * 300 - Redirection * 400 - Client Error * 500 - Server Error -Status Codes: http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html + +HTTP Status Codes: 100 - Informational * 200 - Success * 300 - Redirection * 400 - Client Error * 500 - Server Error .LINK + http://obscuresecurity.blogspot.com +http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html #> [CmdletBinding()] Param( - [Parameter(Mandatory = $True)] [String] $Target, - [Parameter()] [String] [ValidateNotNullOrEmpty()] $Path = '.\Dictionaries\admin.txt', - [Parameter()] [Int] $Port, - [Parameter()] [Switch] $UseSSL + [Parameter(Mandatory = $True)] + [String] + $Target, + + [String] + [ValidateNotNullOrEmpty()] + $Path = '.\Dictionaries\admin.txt', + + [Int] + $Port, + + [Switch] + $UseSSL ) if (Test-Path $Path) { diff --git a/Recon/Invoke-ReverseDnsLookup.ps1 b/Recon/Invoke-ReverseDnsLookup.ps1 index af45f2e..1346ae6 100644 --- a/Recon/Invoke-ReverseDnsLookup.ps1 +++ b/Recon/Invoke-ReverseDnsLookup.ps1 @@ -1,64 +1,66 @@ function Invoke-ReverseDnsLookup { - <# -.Synopsis +.SYNOPSIS + +Perform a reverse DNS lookup scan on a range of IP addresses. - PowerSploit Module - Invoke-ReverseDnsLookup - Author: Matthew Graeber (@mattifestation) - License: BSD 3-Clause +PowerSploit Function: Invoke-ReverseDnsLookup +Author: Matthew Graeber (@mattifestation) +License: BSD 3-Clause +Required Dependencies: None +Optional Dependencies: None -.Description +.DESCRIPTION - Invoke-ReverseDnsLookup scans an IP address range for DNS PTR records. This script - is useful for performing DNS reconnaisance prior to conducting an authorized - penetration test. +Invoke-ReverseDnsLookup scans an IP address range for DNS PTR records. This script is useful for performing DNS reconnaisance prior to conducting an authorized penetration test. -.Parameter IPRange +.PARAMETER IPRange - Specifies the IP address range. The range provided can be in the form of a single - IP address, a low-high range, or a CIDR range. Comma-delimited ranges may can be - provided. +Specifies the IP address range. The range provided can be in the form of a single IP address, a low-high range, or a CIDR range. Comma-delimited ranges may can be provided. -.Example +.EXAMPLE - PS> Invoke-ReverseDnsLookup 74.125.228.0/29 +C:\PS> Invoke-ReverseDnsLookup 74.125.228.0/29 - IP HostName - -- -------- - 74.125.228.1 iad23s05-in-f1.1e100.net - 74.125.228.2 iad23s05-in-f2.1e100.net - 74.125.228.3 iad23s05-in-f3.1e100.net - 74.125.228.4 iad23s05-in-f4.1e100.net - 74.125.228.5 iad23s05-in-f5.1e100.net - 74.125.228.6 iad23s05-in-f6.1e100.net +IP HostName +-- -------- +74.125.228.1 iad23s05-in-f1.1e100.net +74.125.228.2 iad23s05-in-f2.1e100.net +74.125.228.3 iad23s05-in-f3.1e100.net +74.125.228.4 iad23s05-in-f4.1e100.net +74.125.228.5 iad23s05-in-f5.1e100.net +74.125.228.6 iad23s05-in-f6.1e100.net - Description - ----------- - Returns the hostnames of the IP addresses specified by the CIDR range. +Description +----------- +Returns the hostnames of the IP addresses specified by the CIDR range. -.Example +.EXAMPLE - PS> Invoke-ReverseDnsLookup '74.125.228.1,74.125.228.4-74.125.228.6' - - IP HostName - -- -------- - 74.125.228.1 iad23s05-in-f1.1e100.net - 74.125.228.4 iad23s05-in-f4.1e100.net - 74.125.228.5 iad23s05-in-f5.1e100.net - 74.125.228.6 iad23s05-in-f6.1e100.net - - Description - ----------- - Returns the hostnames of the IP addresses specified by the IP range specified. +C:\PS> Invoke-ReverseDnsLookup '74.125.228.1,74.125.228.4-74.125.228.6' +IP HostName +-- -------- +74.125.228.1 iad23s05-in-f1.1e100.net +74.125.228.4 iad23s05-in-f4.1e100.net +74.125.228.5 iad23s05-in-f5.1e100.net +74.125.228.6 iad23s05-in-f6.1e100.net -.Link +Description +----------- +Returns the hostnames of the IP addresses specified by the IP range specified. + +.LINK - My blog: http://www.exploit-monday.com +http://www.exploit-monday.com #> -Param( [Parameter(Position = 0, Mandatory = $True)] [String] $IpRange ) + Param ( + [Parameter(Position = 0, Mandatory = $True)] + [String] + $IpRange + ) function Parse-IPList ([String] $IpRange) { -- cgit v1.2.3