-
Notifications
You must be signed in to change notification settings - Fork 230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permission Checking and rules for it #101
Comments
Yeah Group3r has the better method in it - it's still imperfect but it's as good as it's going to get without a bunch of noisy NetLocalGroupEnum stuff. Off the top of my head, writable things that should be considered interesting: |
ok so the aclcrimes branch should have the ability to semi-accurately get the R/W/M status of a file if you wanna take that for a spin. If that's all working properly it shouldn't be too hard to make it possible to write rules for it too. |
@cmprmsd reminder to please test the aclcrimes branch out. |
Nooooooo! I l0ss't track of this issue! package main
import (
"fmt"
"math/rand"
"time"
)
func main() {
rand.Seed(time.Now().Unix())
excuses := []string{"I have a lot of work to do for my job.", "I have a lot of errands to run.", "I have a lot of family responsibilities.", "I'm in the middle of a big project for school.", "I'm training for a marathon.", "I have a lot of social commitments.", "I have a lot of appointments to attend.", "I'm trying to catch up on sleep."}
fmt.Println(excuses[rand.Intn(len(excuses))])
} I'll check it out asap! Thanks for implementing this functionality! I'll also share some additional rules 🍀 |
@l0ss Anything I can do to help you out on this one? I just stumbled over this issue. 😄 |
Hey l0ss!
I think we forgot to open a new issue for the permission checks discussed in #84
I just noticed that the permissions are still hardcoded and thought, it may be worth a shot to get this done.
You mentioned a better way that you worked on in group3r. I'll have a look at it if I find some spare time.
For the future it would make sense to have rules to identify e.g. folders like Microsoft's
autostart
folder write access in order to place some evil stuff in it during engagements.We could brainstorm also on some other folders that might be critical like
wwwroot
or/var/www
.Have a great weekend!
The text was updated successfully, but these errors were encountered: