Skip to content
This repository was archived by the owner on Sep 15, 2020. It is now read-only.

Commit e22044a

Browse files
committed
Initial commit (v0.1)
0 parents  commit e22044a

File tree

3 files changed

+859
-0
lines changed

3 files changed

+859
-0
lines changed

LICENSE

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
Original BSD License (BSD with advertising)
2+
3+
Copyright (c) 2013, {Aditya K sood}
4+
All rights reserved.
5+
6+
Redistribution and use in source and binary forms, with or without modification,
7+
are permitted provided that the following conditions are met:
8+
9+
* Redistributions of source code must retain the above copyright notice,
10+
this list of conditions and the following disclaimer.
11+
* Redistributions in binary form must reproduce the above copyright notice,
12+
this list of conditions and the following disclaimer in the documentation
13+
and/or other materials provided with the distribution.
14+
* Neither the name of IOActive or SecNiche nor the names of its contributors
15+
may be used to endorse or promote products derived from this software
16+
without specific prior written permission.
17+
18+
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
19+
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20+
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21+
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
22+
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
23+
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24+
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
25+
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
26+
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
27+
OF THE POSSIBILITY OF SUCH DAMAGE.
28+

README

Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
-------------------------------------------------
2+
Sparty - Sharepoint/Frontpage Auditing Tool !
3+
Authored by: Aditya K Sood |{0kn0ck}@secniche.org | 2013
4+
Twitter: @AdityaKSood
5+
Powered by: SecNiche Security Labs !
6+
------------------------------------------------
7+
Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize the security configurations of sharepoint and frontpage based web applications. Due to the complex nature of these web administration software, it is required to have a simple and efficient tool that gathers information, check access permissions, dump critical information from default files and perform automated exploitation if security risks are identified. A number of automated scanners fall short of this and Sparty is a solution to that.
8+
9+
10+
-----------------------------------
11+
Functionalities and capabilities !
12+
-----------------------------------
13+
1. Sharepoint and Frontpage Version Detection!
14+
2. Dumping Password from Exposed Configuration Files!
15+
3. Exposed Sharepoint/Frontpage Services Scan!
16+
4. Exposed Directory Check!
17+
5. Installed File and Access Rights Check!
18+
6. RPC Service Querying!
19+
7. File Enumeration!
20+
8. File Uploading Check!
21+
22+
-----------------------------------------------
23+
Additional notes about working and design
24+
----------------------------------------------
25+
1. This version of sparty is written in Python 2.6 (final) running on backtrack 5.0.
26+
2. This version (v 0.1) primarily includes assessment of configuration flaws.
27+
3. This version is based on the practical testing and assessment of frontpage & sharepoint.
28+
29+
----------------------------------------------
30+
Requirements
31+
----------------------------------------------
32+
1. This version uses following libraries:
33+
import urllib2
34+
import re
35+
import os, sys
36+
import optparse
37+
import httplib
38+
39+
2. Python 2.6 is required.
40+
41+
42+
-----------------------------------------------
43+
[+] Things to take care of while using sparty !
44+
-----------------------------------------------
45+
46+
Please take this into consideration:
47+
48+
1. Always specify https | http explcitly !
49+
2. Always provide the proper directory structure where sharepoint/frontpage is installed !
50+
3. Do not specify '/' at the end of url !
51+
52+
--------------------------
53+
[+] Sparty Help
54+
--------------------------
55+
56+
---------------------------------------------------------------
57+
58+
_|_|_| _|_|_| _|_| _|_|_| _|_|_|_|_| _| _|
59+
_| _| _| _| _| _| _| _| _| _|
60+
_|_| _|_|_| _|_|_|_| _|_|_| _| _|
61+
_| _| _| _| _| _| _| _|
62+
_|_|_| _| _| _| _| _| _| _|
63+
64+
SPARTY : Sharepoint/Frontpage Security Auditing Tool!
65+
Authored by: Aditya K Sood |{0kn0ck}@secniche.org | 2013
66+
Twitter: @AdityaKSood
67+
68+
--------------------------------------------------------------
69+
Usage: sparty.py [options]
70+
71+
Options:
72+
--version show program's version number and exit
73+
-h, --help show this help message and exit
74+
75+
Frontpage::
76+
-f FRONTPAGE, --frontpage=FRONTPAGE
77+
<FRONTPAGE = pvt | bin> -- to check access permissions
78+
on frontpage standard files in vti or bin directory!
79+
80+
Sharepoint::
81+
-s SHAREPOINT, --sharepoint=SHAREPOINT
82+
<SHAREPOINT = forms | layouts | catalog> -- to check
83+
access permissions on sharepoint standard files in
84+
forms or layouts or catalog directory!
85+
86+
Mandatory::
87+
-u URL, --url=URL target url to scan with proper structure
88+
89+
Information Gathering and Exploit::
90+
-v FINGERPRINT, --http_fingerprint=FINGERPRINT
91+
<FINGERPRINT = ms_sharepoint | ms_frontpage> --
92+
fingerprint sharepoint or frontpage based on HTTP
93+
headers!
94+
-d DUMP, --dump=DUMP
95+
<DUMP = dump | extract> -- dump credentials from
96+
default sharepoint and frontpage files (configuration
97+
errors and exposed entries)!
98+
-l DIRECTORY, --list=DIRECTORY
99+
<DIRECTORY = list | index> -- check directory listing
100+
and permissions!
101+
-e EXPLOIT, --exploit=EXPLOIT
102+
EXPLOIT = <rpc_version_check | file_upload |
103+
config_check> -- exploit vulnerable installations by
104+
checking RPC querying and file uploading
105+
-i SERVICES, --services=SERVICES
106+
SERVICES = <serv | services> -- checking exposed
107+
services !
108+
109+
General::
110+
-x EXAMPLES, --examples=EXAMPLES
111+
running usage examples !
112+
113+
114+

0 commit comments

Comments
 (0)