Sparty – MS Sharepoint and Frontpage Auditing Tool

Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize the security configurations of sharepoint and frontpage based web applications. Due to the complex nature of these web administration software, it is required to have a simple and efficient tool that gathers information, check access permissions, dump critical information from default files and perform automated exploitation if security risks are identified. A number of automated scanners fall short of this and Sparty is a solution to that.

Functionalities and capabilities !
1. Sharepoint and Frontpage Version Detection!
2. Dumping Password from Exposed Configuration Files!
3. Exposed Sharepoint/Frontpage Services Scan!
4. Exposed Directory Check!
5. Installed File and Access Rights Check!
6. RPC Service Querying!
7. File Enumeration!
8. File Uploading Check!
Requirements
1. This version uses following libraries:
        import urllib2
        import re
        import os, sys
        import optparse
        import httplib
2. Python 2.6 is required.

Usage: sparty.py [options]

Options:
--version show program's version number and exit
-h, --help show this help message and exit

Frontpage::
-f FRONTPAGE, --frontpage=FRONTPAGE
-- to check access permissions
on frontpage standard files in vti or bin directory!

Sharepoint::
-s SHAREPOINT, --sharepoint=SHAREPOINT
-- to check
access permissions on sharepoint standard files in
forms or layouts or catalog directory!

Mandatory::
-u URL, --url=URL target url to scan with proper structure

Information Gathering and Exploit::
-v FINGERPRINT, --http_fingerprint=FINGERPRINT
--
fingerprint sharepoint or frontpage based on HTTP
headers!
-d DUMP, --dump=DUMP
-- dump credentials from
default sharepoint and frontpage files (configuration
errors and exposed entries)!
-l DIRECTORY, --list=DIRECTORY
-- check directory listing
and permissions!
-e EXPLOIT, --exploit=EXPLOIT
EXPLOIT = -- exploit vulnerable installations by
checking RPC querying and file uploading
-i SERVICES, --services=SERVICES
SERVICES = -- checking exposed
services !
services !

Authentication [devalias.net]:
-a AUTHENTICATION, --auth-type=AUTHENTICATION
AUTHENTICATION = -- Authenticate with NTLM
user/pass !

General::
-x EXAMPLES, --examples=EXAMPLES
running usage examples !

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s