I am with IT security division. A few days ago I ocassionally found a intranet penetration tool with various features on my client's host server. For now I named it HD2.0. The analysis features are as follows.
![[Image: 01.png]](https://image.ibb.co/cwwoKJ/01.png)
![[Image: 02.png]](https://image.ibb.co/cU6Ymy/02.png)
![[Image: 03.png]](https://image.ibb.co/dJZ8KJ/03.png)
![[Image: 04.png]](https://image.ibb.co/jJ8Dmy/04.png)
![[Image: 05.png]](https://image.ibb.co/cs9xDd/05.png)
![[Image: 06.png]](https://image.ibb.co/mExHDd/06.png)
![[Image: 07.png]](https://image.ibb.co/bEem6y/07.png)
![[Image: 08.png]](https://image.ibb.co/gQgoKJ/08.png)
![[Image: 09.png]](https://image.ibb.co/hSBoKJ/09.png)
Download
https://drive.google.com/open?id=1o4mnTy75U9T70vLYWJadJz0vi82VFfwf
![[Image: 01.png]](https://image.ibb.co/cwwoKJ/01.png)
![[Image: 02.png]](https://image.ibb.co/cU6Ymy/02.png)
Code:
hd.exe smb 192.168.1.2 username passwd [options]
hd.exe arplive
hd.exe uptime 192.168.1.2
hd.exe os 192.168.1.2
hd.exe port 192.168.1.2
![[Image: 03.png]](https://image.ibb.co/dJZ8KJ/03.png)
![[Image: 04.png]](https://image.ibb.co/jJ8Dmy/04.png)
![[Image: 05.png]](https://image.ibb.co/cs9xDd/05.png)
Code:
hd.exe smb 192.168.1.2 test.com\users passwd -k
![[Image: 06.png]](https://image.ibb.co/mExHDd/06.png)
![[Image: 07.png]](https://image.ibb.co/bEem6y/07.png)
Code:
hd.exe smb 192.168.1.2 test.com\users passwd -gadministrators
![[Image: 08.png]](https://image.ibb.co/gQgoKJ/08.png)
Code:
hd.exe smb 192.168.1.2 test.com\users passwd -q
![[Image: 09.png]](https://image.ibb.co/hSBoKJ/09.png)
Code:
hd.exe at \\192.168.1.2 "cmd /c set"
Download
https://drive.google.com/open?id=1o4mnTy75U9T70vLYWJadJz0vi82VFfwf