sexta-feira, 4 de abril de 2014

AccessChk v5.11

 


Introdução:

Esta ferramenta permite a um administrador de sistemas aceder/gerir recursos, tais como ficheiros, diretórios, chaves de registo, serviços e objetos globais, de utilizadores ou grupos.

Instalação:

AccessChk é uma ferramenta que se corre via linha de comandos, para tal basta navegar até onde a pasta o executável se encontra e escrever o comando "accesschk" para ver a sintaxe.

Sintaxe & Utilização:

accesschk [-s][-e][-u][-r][-w][-n][-v][[-a]|[-k]|[-p [-f] [-t]][-o [-t <tipo de objeto>]][-c]|[-d]] [[-l [-i]]|[utilizador]] <ficheiro, diretório, chave de registo, processo, serviço, objeto>

-aName is a Windows account right. Specify "*" as the name to show all rights assigned to a user. Note that when you specify a specific right, only groups and accounts directly assigned to the right are displayed.
-cName is a Windows Service, e.g. ssdpsrv. Specify "*" as the name to show all services and "scmanager" to check the security of the Service Control Manager.
-dOnly process directories or top-level keys
-eOnly show explicitly set-Integrity Levels (Windows Vista only)
-fShow full process token information including groups and privileges
-iIgnore objects with only inherited ACEs when dumping full access control lists.
-kName is a Registry key, e.g. hklm\software
-lShow full access control list. Add -i to ignore inherited ACEs.
-nShow only objects that have no access
-oName is an object in the Object Manager namespace (default is root). To view the contents of a directory, specify the name with a trailing backslash or add -s. Add -t and an object type (e.g. section) to see only objects of a specific type.
-pName is a process name or PID, e.g. cmd.exe (specify "*" as the name to show all processes). Add -f to show full process token information, including groups and privileges. Add -t to show threads.
-qOmit Banner
-rShow only objects that have read access
-sRecurse
-tObject type filter, e.g. "section"
-uSuppress errors
-vVerbose (includes Windows Vista Integrity Level)
-wShow only objects that have write access


Exemplos:

Mostra os tipos de acesso que o tipo de conta Power Users tem em ficheiros e diretórios dentro de \Windows\System32:
accesschk "power users" c:\windows\system32

Mostra que membros do grupo Users têm acesso a escrita:
accesschk users -cw *

Mostra que chaves de registo dentro de HKLM\CurrentUser um utilizador não tem acesso:
accesschk -kns austin\mruss hklm\software

Mostra a segurança em HKLM\Software key:
accesschk -k hklm\software

Mostrar os objetos globais que todos os utilizadores podem modificar:
accesschk -wuo everyone \basednamedobjects

Mais informação: http://technet.microsoft.com/en-us/sysinternals/bb664922
Download da Ferramenta: http://download.sysinternals.com/files/AccessChk.zip

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Labels

Question Dump A30-327 ACE AccessData AccessData ACE AccessData Certified Examiner AccessData FTK FTK Segurança da Informação Software (ISC)² CISSP Certified Information System Security Professional Preparação para Certificação Browsers Ferramentas Windows Análise Forense Microsoft OSINT Ouya Redes Android Malware Open Source Open Source Intelligence Sysinternals Sysinternals Live Sysinternals tools Cache Cookies Fingerprint Games Internet Explorer Mozilla Firefox Notícia Pentesting Python Script Skype Vulnerabilidades .dd .net 3.5 1Z0-144 ARPwner AccessChk v5.11 AccessEnum v1.32 Auburn Base de Dados Bypass C# CERT CISP CMS CSIP Canonical Centro de Cibersegurança China China Software and Integrated Chip Promotions Ciência Forense Computacional Cloud Creepy Cyber Security Information Sharing Partnership Código Dev Developer Disassembler Exploits FOCA Favorites Fingerprinting Organizations with Collected Archives Firefox Foundstone FoxOne Scanner Futuremark GCHQ Galleta GameInformer Gamepop Gaming Geolocalization Github Gmail Google Chrome Hardware Hash Hotmail IDS IP IPS JSON Javascript Object Notation Format Kaspersky Lab Kon-boot Live View MAC OSX MAC OSX Bypass MI5 Malware Bancário McAfee labs Microsoft Office Mozilla Foundation Msiecfexport Netflix Nirsoft Nmap Notepad++ ODA Online DisAssembler Oracle Oracle 11G Oryon C Oryon C Portable Outlook Ouya Specs PL/SQL Pasco Passwords Phishing Poisoning Programar Programação RAW RPC Republica Popular da China SQL SQLite Sandbox Sandboxie Scan Security Meeting ShadowSEC Skype Log Viewer Smartphones SmoothSec Startup Terdot The Verge Timestamp Trojan UK Ubuntu UbuntuKylin OS Userrole Virtualização WIFI WebApp Webmails Windows Bypass Windows Registry Write Blocker XML Yahoo Zeus hash-identifier iFixIt index.dat profiles.ini sqlite3 th3j35t3r wig

Posts + Vistos

Com tecnologia do Blogger.