zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations and red teamers can utilize zBang to identify potential attack vectors and improve the security posture of the network.
The results can be analyzed with the graphic interface or by reviewing the raw output files.
The tool is built from five different scanning modules:
- ACLight scan – discovers the most privileged accounts that must be protected, including suspicious Shadow Admins.
- Skeleton Key scan – discovers Domain Controllers that might be infected by Skeleton Key malware.
- SID History scan – discovers hidden privileges in domain accounts with secondary SID (SID History attribute).
- RiskySPNs scan – discovers risky configuration of SPNs that might lead to credential theft of Domain Admins
- Mystique scan – discovers risky Kerberos delegation configuration in the network.
Requirements to run zBang Privileged Account Threat Detection Tool
- Run it with any domain user. The scans do not require any extra privileges; the tool performs read-only LDAP queries to the DC.
- Run the tool from a domain joined machine (a Windows machine).
- PowerShell version 3 or above and .NET 4.5 (it comes by default in Windows 8/2012 and above).
zBang Privileged Account Threat Detection Tool Performance
zBang runs quickly and doesn’t need any special privileges over the network. As the only communication required is to the domain controller through legitimate read-only LDAP queries, a typical execution time of zBang on a network with around 1,000 user accounts will be seven minutes.
When you intend to scan large networks with multiple trust-connected domains, it’s recommended to check the domain trusts configuration or run zBang separately from within each domain to avoid possible permission and connectivity issues.
You can download zBang here:
Or read more here.