sia_tp_sample / AnasAboureada__Penetration-Testing-Study-Notes.jsonl
shahp7575's picture
commit files to HF hub
3a7f06a
{"nwo":"AnasAboureada\/Penetration-Testing-Study-Notes","sha":"8152fd609cf818dba2f07e060738a24c56221687","path":"enumeration\/tools\/recon_scan\/samrdump.py","language":"python","identifier":"SAMRDump.dump","parameters":"(self, addr)","argument_list":"","return_statement":"","docstring":"Dumps the list of users and shares registered present at\n addr. Addr is a valid host name or IP address.","docstring_summary":"Dumps the list of users and shares registered present at\n addr. Addr is a valid host name or IP address.","docstring_tokens":["Dumps","the","list","of","users","and","shares","registered","present","at","addr",".","Addr","is","a","valid","host","name","or","IP","address","."],"function":"def dump(self, addr):\n \"\"\"Dumps the list of users and shares registered present at\n addr. Addr is a valid host name or IP address.\n \"\"\"\n\n encoding = sys.getdefaultencoding()\n\n print 'Retrieving endpoint list from %s' % addr\n\n # Try all requested protocols until one works.\n entries = []\n for protocol in self.__protocols:\n protodef = SAMRDump.KNOWN_PROTOCOLS[protocol]\n port = protodef[1]\n\n print \"Trying protocol %s...\" % protocol\n rpctransport = transport.SMBTransport(addr, port, r'\\samr', self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash)\n\n try:\n entries = self.__fetchList(rpctransport)\n except Exception, e:\n print 'Protocol failed: %s' % e\n raise\n else:\n # Got a response. No need for further iterations.\n break\n\n\n # Display results.\n\n for entry in entries:\n (username, uid, user) = entry\n base = \"%s (%d)\" % (username, uid)\n print base + '\/Enabled:', ('false', 'true')[user.is_enabled()]\n print base + '\/Last Logon:', user.get_logon_time()\n print base + '\/Last Logoff:', user.get_logoff_time()\n print base + '\/Kickoff:', user.get_kickoff_time()\n print base + '\/Last PWD Set:', user.get_pwd_last_set()\n print base + '\/PWD Can Change:', user.get_pwd_can_change()\n print base + '\/PWD Must Change:', user.get_pwd_must_change()\n print base + '\/Group id: %d' % user.get_group_id()\n print base + '\/Bad pwd count: %d' % user.get_bad_pwd_count()\n print base + '\/Logon count: %d' % user.get_logon_count()\n items = user.get_items()\n for i in samr.MSRPCUserInfo.ITEMS.keys():\n name = items[samr.MSRPCUserInfo.ITEMS[i]].get_name()\n name = name.encode(encoding, 'replace')\n print base + '\/' + i + ':', name\n\n if entries:\n num = len(entries)\n if 1 == num:\n print 'Received one entry.'\n else:\n print 'Received %d entries.' % num\n else:\n print 'No entries received.'","function_tokens":["def","dump","(","self",",","addr",")",":","encoding","=","sys",".","getdefaultencoding","(",")","print","'Retrieving endpoint list from %s'","%","addr","# Try all requested protocols until one works.","entries","=","[","]","for","protocol","in","self",".","__protocols",":","protodef","=","SAMRDump",".","KNOWN_PROTOCOLS","[","protocol","]","port","=","protodef","[","1","]","print","\"Trying protocol %s...\"","%","protocol","rpctransport","=","transport",".","SMBTransport","(","addr",",","port",",","r'\\samr'",",","self",".","__username",",","self",".","__password",",","self",".","__domain",",","self",".","__lmhash",",","self",".","__nthash",")","try",":","entries","=","self",".","__fetchList","(","rpctransport",")","except","Exception",",","e",":","print","'Protocol failed: %s'","%","e","raise","else",":","# Got a response. No need for further iterations.","break","# Display results.","for","entry","in","entries",":","(","username",",","uid",",","user",")","=","entry","base","=","\"%s (%d)\"","%","(","username",",","uid",")","print","base","+","'\/Enabled:'",",","(","'false'",",","'true'",")","[","user",".","is_enabled","(",")","]","print","base","+","'\/Last Logon:'",",","user",".","get_logon_time","(",")","print","base","+","'\/Last Logoff:'",",","user",".","get_logoff_time","(",")","print","base","+","'\/Kickoff:'",",","user",".","get_kickoff_time","(",")","print","base","+","'\/Last PWD Set:'",",","user",".","get_pwd_last_set","(",")","print","base","+","'\/PWD Can Change:'",",","user",".","get_pwd_can_change","(",")","print","base","+","'\/PWD Must Change:'",",","user",".","get_pwd_must_change","(",")","print","base","+","'\/Group id: %d'","%","user",".","get_group_id","(",")","print","base","+","'\/Bad pwd count: %d'","%","user",".","get_bad_pwd_count","(",")","print","base","+","'\/Logon count: %d'","%","user",".","get_logon_count","(",")","items","=","user",".","get_items","(",")","for","i","in","samr",".","MSRPCUserInfo",".","ITEMS",".","keys","(",")",":","name","=","items","[","samr",".","MSRPCUserInfo",".","ITEMS","[","i","]","]",".","get_name","(",")","name","=","name",".","encode","(","encoding",",","'replace'",")","print","base","+","'\/'","+","i","+","':'",",","name","if","entries",":","num","=","len","(","entries",")","if","1","==","num",":","print","'Received one entry.'","else",":","print","'Received %d entries.'","%","num","else",":","print","'No entries received.'"],"url":"https:\/\/github.com\/AnasAboureada\/Penetration-Testing-Study-Notes\/blob\/8152fd609cf818dba2f07e060738a24c56221687\/enumeration\/tools\/recon_scan\/samrdump.py#L54-L110"}