|
| 1 | +------------------------------------------------- |
| 2 | +Sparty - Sharepoint/Frontpage Auditing Tool ! |
| 3 | +Authored by: Aditya K Sood |{0kn0ck}@secniche.org | 2013 |
| 4 | + Twitter: @AdityaKSood |
| 5 | +Powered by: SecNiche Security Labs ! |
| 6 | +------------------------------------------------ |
| 7 | +Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize the security configurations of sharepoint and frontpage based web applications. Due to the complex nature of these web administration software, it is required to have a simple and efficient tool that gathers information, check access permissions, dump critical information from default files and perform automated exploitation if security risks are identified. A number of automated scanners fall short of this and Sparty is a solution to that. |
| 8 | + |
| 9 | + |
| 10 | +----------------------------------- |
| 11 | +Functionalities and capabilities ! |
| 12 | +----------------------------------- |
| 13 | +1. Sharepoint and Frontpage Version Detection! |
| 14 | +2. Dumping Password from Exposed Configuration Files! |
| 15 | +3. Exposed Sharepoint/Frontpage Services Scan! |
| 16 | +4. Exposed Directory Check! |
| 17 | +5. Installed File and Access Rights Check! |
| 18 | +6. RPC Service Querying! |
| 19 | +7. File Enumeration! |
| 20 | +8. File Uploading Check! |
| 21 | + |
| 22 | +----------------------------------------------- |
| 23 | +Additional notes about working and design |
| 24 | +---------------------------------------------- |
| 25 | +1. This version of sparty is written in Python 2.6 (final) running on backtrack 5.0. |
| 26 | +2. This version (v 0.1) primarily includes assessment of configuration flaws. |
| 27 | +3. This version is based on the practical testing and assessment of frontpage & sharepoint. |
| 28 | + |
| 29 | +---------------------------------------------- |
| 30 | +Requirements |
| 31 | +---------------------------------------------- |
| 32 | +1. This version uses following libraries: |
| 33 | + import urllib2 |
| 34 | + import re |
| 35 | + import os, sys |
| 36 | + import optparse |
| 37 | + import httplib |
| 38 | + |
| 39 | +2. Python 2.6 is required. |
| 40 | + |
| 41 | + |
| 42 | +----------------------------------------------- |
| 43 | +[+] Things to take care of while using sparty ! |
| 44 | +----------------------------------------------- |
| 45 | + |
| 46 | +Please take this into consideration: |
| 47 | + |
| 48 | +1. Always specify https | http explcitly ! |
| 49 | +2. Always provide the proper directory structure where sharepoint/frontpage is installed ! |
| 50 | +3. Do not specify '/' at the end of url ! |
| 51 | + |
| 52 | +-------------------------- |
| 53 | +[+] Sparty Help |
| 54 | +-------------------------- |
| 55 | + |
| 56 | + --------------------------------------------------------------- |
| 57 | + |
| 58 | + _|_|_| _|_|_| _|_| _|_|_| _|_|_|_|_| _| _| |
| 59 | + _| _| _| _| _| _| _| _| _| _| |
| 60 | + _|_| _|_|_| _|_|_|_| _|_|_| _| _| |
| 61 | + _| _| _| _| _| _| _| _| |
| 62 | + _|_|_| _| _| _| _| _| _| _| |
| 63 | + |
| 64 | + SPARTY : Sharepoint/Frontpage Security Auditing Tool! |
| 65 | + Authored by: Aditya K Sood |{0kn0ck}@secniche.org | 2013 |
| 66 | + Twitter: @AdityaKSood |
| 67 | + |
| 68 | + -------------------------------------------------------------- |
| 69 | +Usage: sparty.py [options] |
| 70 | + |
| 71 | +Options: |
| 72 | + --version show program's version number and exit |
| 73 | + -h, --help show this help message and exit |
| 74 | + |
| 75 | + Frontpage:: |
| 76 | + -f FRONTPAGE, --frontpage=FRONTPAGE |
| 77 | + <FRONTPAGE = pvt | bin> -- to check access permissions |
| 78 | + on frontpage standard files in vti or bin directory! |
| 79 | + |
| 80 | + Sharepoint:: |
| 81 | + -s SHAREPOINT, --sharepoint=SHAREPOINT |
| 82 | + <SHAREPOINT = forms | layouts | catalog> -- to check |
| 83 | + access permissions on sharepoint standard files in |
| 84 | + forms or layouts or catalog directory! |
| 85 | + |
| 86 | + Mandatory:: |
| 87 | + -u URL, --url=URL target url to scan with proper structure |
| 88 | + |
| 89 | + Information Gathering and Exploit:: |
| 90 | + -v FINGERPRINT, --http_fingerprint=FINGERPRINT |
| 91 | + <FINGERPRINT = ms_sharepoint | ms_frontpage> -- |
| 92 | + fingerprint sharepoint or frontpage based on HTTP |
| 93 | + headers! |
| 94 | + -d DUMP, --dump=DUMP |
| 95 | + <DUMP = dump | extract> -- dump credentials from |
| 96 | + default sharepoint and frontpage files (configuration |
| 97 | + errors and exposed entries)! |
| 98 | + -l DIRECTORY, --list=DIRECTORY |
| 99 | + <DIRECTORY = list | index> -- check directory listing |
| 100 | + and permissions! |
| 101 | + -e EXPLOIT, --exploit=EXPLOIT |
| 102 | + EXPLOIT = <rpc_version_check | file_upload | |
| 103 | + config_check> -- exploit vulnerable installations by |
| 104 | + checking RPC querying and file uploading |
| 105 | + -i SERVICES, --services=SERVICES |
| 106 | + SERVICES = <serv | services> -- checking exposed |
| 107 | + services ! |
| 108 | + |
| 109 | + General:: |
| 110 | + -x EXAMPLES, --examples=EXAMPLES |
| 111 | + running usage examples ! |
| 112 | + |
| 113 | + |
| 114 | + |
0 commit comments