techspence/ScriptSentry: ScriptSentry finds misconfigured and dangerous logon scripts.

Source: GitHub
Author: unknown
URL: https://github.com/techspence/ScriptSentry

“`markdown
# ONE SENTENCE SUMMARY:
ScriptSentry identifies misconfigured permissions, plaintext credentials, and risky logon scripts to enhance network security.

# MAIN POINTS:
1. Unsafe UNC folder permissions grant “Everyone” full control over critical shared folders.
2. Logon scripts with weak permissions allow unauthorized access to sensitive files.
3. GPO logon scripts have insecure permissions, enabling risky user access.
4. Unsafe UNC file permissions expose critical files to “Everyone” with full control.
5. NETLOGON/SYSVOL folders have weak permissions for domain users and authenticated users.
6. Plaintext credentials are exposed in multiple scripts, risking unauthorized access.
7. Nonexistent shares referenced in scripts create vulnerabilities and potential misconfigurations.
8. Admin accounts are linked with logon scripts that can be exploited.
9. Exploitable logon scripts map to nonexistent shares, increasing the risk for admin users.
10. Identified risks include DNS exploits, plaintext passwords, and misconfigurations in folder and file permissions.

# TAKEAWAYS:
1. Address “Everyone” permissions on shared folders and files to prevent unauthorized access.
2. Secure logon scripts by restricting permissions to authorized users only.
3. Eliminate plaintext credentials from scripts to enhance password security.
4. Audit and correct nonexistent shares referenced in scripts to avoid misconfigurations.
5. Review admin accounts and their logon scripts for potential security risks.
“`