{"id":8332,"date":"2020-01-14T13:13:25","date_gmt":"2020-01-14T07:43:25","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=8332"},"modified":"2020-01-14T13:13:25","modified_gmt":"2020-01-14T07:43:25","slug":"chaps","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/chaps\/","title":{"rendered":"CHAPS : Configuration Hardening Assessment PowerShell Script"},"content":{"rendered":"\n<p><strong>CHAPS <\/strong>is a PowerShell script for checking system security settings  where additional software and assessment tools, such as Microsoft Policy  Analyzer, cannot be installed. <\/p>\n\n\n\n<p>The purpose of this script is to run it  on a server or workstation to collect configuration information about  that system. The information collected can then be used to provide  recommendations (and references) to improve the security of the  individual system and systemic issues within the organization&#8217;s Windows  environment. <\/p>\n\n\n\n<p>Examples of environments where this script is useful  include Industrial Control System (ICS) environments where systems  cannot be modified. These systems include Engineer \/ Operator  workstations, Human Machine Interface (HMI) systems, and management  servers that are deployed in production environments.<\/p>\n\n\n\n<p>This script is NOT intended to be a replacement for Microsoft&#8217;s  Policy Analyzer. The best way to audit a system&#8217;s configuration is to  use the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-compliance-toolkit-10\">Microsoft Security Compliance Toolkit<\/a> and Policy Analyzer with a <a href=\"https:\/\/adsecurity.org\/?p=3299\">Windows Workstation Security Baseline GPO<\/a>.  <\/p>\n\n\n\n<p>The Policy Analyzer&#8217;s output can be exported an MS Excel file, but it  requires the Microsoft Excel is installed on the system. Cut and pasting  this information does work, but might not be an option on a physical  system. Also, using the Policy Analyzer requires installation of the  Windows software, which may not be permitted.<\/p>\n\n\n\n<p>This script runs in PowerShell and should be PowerShell-version \nindependent. Some checks may fail depending on the Windows version, \nsystem configurations, and whether or not it is run with Administrator \nprivileges. Instances where commands did not run successfully are noted \nand should be manually investigated where possible.<\/p>\n\n\n\n<p>This script was developed using information from several sources  (noted in Useful Resources section) to identify recommended security  configurations to reduce the likelihood of a compromised system and to  log user events conducted on the system. It pulls heavily from the <a href=\"https:\/\/adsecurity.org\/?p=3299\">Securing Windows Workstations<\/a> baseline outlined by <a href=\"https:\/\/adsecurity.org\/?author=2\">Sean Metcalf<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/stowaway-multi-hop-proxy-tool-for-pentesters\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Stowaway : Multi-hop Proxy Tool For Pentesters (opens in a new tab)\">Stowaway : Multi-hop Proxy Tool For Pentesters<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#how-to-use\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>How To Use?<\/strong><\/p>\n\n\n\n<p>The best way to run this script within an ICS environment is to not  write any programs or scripts to the system being reviewed. Do this by  serving these scripts from a webserver running on another system on the  network. <\/p>\n\n\n\n<p>Download CHAPS and PowerSploit into the same directory and open  a terminal and change into that directory. Using Python3 run the  command &#8216;python3 -m http.server 8181&#8217;. This will start a webserver  listening on all of the systems IP addresses.<\/p>\n\n\n\n<p>On the target system open a CMD.exe window, preferably as an Administrator. Run the command <code>powershell.exe -exec bypass<\/code> to being a PowerShell prompt. From this prompt, run the following command to execute the <code>chaps.ps1<\/code> script.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>IEX (New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/chaps\/chaps.ps1&#8242;) <\/webserver><\/strong><\/p>\n\n\n\n<p>To run the <code><strong>chaps-powershell.ps1<\/strong><\/code> script be sure to turn  off the system&#8217;s Anti-virus to include real-time protection. Running the  following commands will import the appropriate PowerSploit scripts and  then run them.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>IEX (New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/PowerSploit\/Recon\/PowerView.ps1&#8242;) <\/webserver><br><webserver>IEX (New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/PowerSploit\/Exfiltration\/Get-GPPPassword.ps1&#8242;) <\/webserver><\/webserver><br><webserver><webserver>(New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/PowerSploit\/Exfiltration\/Get-GPPAutologon.ps1&#8242;) <\/webserver><\/webserver><\/webserver><br><webserver><webserver><webserver>IEX (New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/PowerSploit\/Exfiltration\/Get-VaultCredential.ps1&#8242;) <\/webserver><\/webserver><\/webserver><\/webserver><br><webserver><webserver><webserver><webserver>IEX (New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/PowerSploit\/Privesc\/PowerUp.ps1&#8242;) <\/webserver><\/webserver><\/webserver><\/webserver><\/webserver><br><webserver><webserver><webserver><webserver><webserver>IEX (New-Object Net.WebClient).DownloadString(&#8216;http:\/\/<webserver>:8181\/chaps\/chaps-powersploit.ps1&#8242;) <\/webserver><\/webserver><\/webserver><\/webserver><\/webserver><\/webserver><\/strong><\/p>\n\n\n\n<p>Each script&#8217;s outputs will be written to the user&#8217;s Temp directory as\n defined by the $env:temp variable. Copy these files off of the system \nbeing reviewed, delete them, and, if necessary, restart the system&#8217;s \nanti-virus.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#system-configuration-checks\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>System Configuration Checks<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#system-info-command\"><\/a><\/h3>\n\n\n\n<p><strong>System Info Command<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Run the systeminfo command to get system information to run the <a href=\"https:\/\/github.com\/bitsadmin\/wesng\">Windows Exploit Suggester &#8211; Next Generation<\/a> tool.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#system-information\"><\/a><\/h3>\n\n\n\n<p><strong>System Information<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Administrator rights\n<ul><li>This check determines if the user running the script has \nadministrator rights. Some checks may not work without admin rights. \nMost of the checks will work, unless some security controls or \nconfigurations prevent it.<\/li><li>There is an error suppression line that has been disabled. Uncomment\n the line to suppress all errors. The &#8220;-ErrorAction SilentlyContinue&#8221; \nhas also been used on some of the commands within the script.<\/li><\/ul>\n<\/li><li>System information\n<ul><li>System Version<\/li><li>User and Path Information<\/li><li>System IPv4 addresses.<\/li><li>System IPv6 addresses.<\/li><li>Windows AutoUpdate configuration.<\/li><li>Check for missing Critical and Important Updates<\/li><li>Check for BitLocker Disk Encryption<\/li><li>Check AlwaysInstallElevated Registry Keys<\/li><\/ul>\n<\/li><li>PowerShell Event Log Settings\n<ul><li>Determine if PowerShell Commandline Auditing is Enabled.<\/li><li>Determine if PowerShell Module Logging is Enabled.<\/li><li>Determine if PowerShell Script Block and Invocation Logging is Enabled.<\/li><li>Determine if PowerShell PowerShell Invocation Header Logging is Enabled.<\/li><li>Determine if PowerShell Protected Event Logging is Enabled.<\/li><\/ul>\n<\/li><li>Windows Event Log Configurations\n<ul><li>Check the maximum log file settings for critical logs:<\/li><li>Application<\/li><li>System<\/li><li>Security<\/li><li>Windows PowerShell<\/li><li>Microsoft-Windows-TerminalServices-LocalSessionManager\/Operational<\/li><li>Microsoft-Windows-TaskScheduler\/Operational<\/li><li>Microsoft-Windows-SMBServer\/Audit<\/li><li>Microsoft-Windows-Security-Netlogon\/Operational<\/li><li>Microsoft-Windows-WinRM\/Operational<\/li><li>Microsoft-Windows-WMI-Activity\/Operational<\/li><\/ul>\n<\/li><li>PowerShell Configuration Settings\n<ul><li>Version of default PowerShell<\/li><li>Check if PowerShell version 2 is permitted.<\/li><li>Determine installed versions of .NET to determine if they support PowerShell version 2.<\/li><li>Determine if PowerShell Language Mode is &#8220;ConstratinedLanguage&#8221;.<\/li><\/ul>\n<\/li><li>Cached Credentials\n<ul><li>Check how many Cached Credentials the system is configured to maintain.<\/li><\/ul>\n<\/li><li>Remote Access Configurations\n<ul><li>Determine if RDP is configured to permit remote connections.\n<ul><li>Check the setting of AllowRemoteRPC.<\/li><li>Check the setting of fDenyTSConnections.<\/li><\/ul>\n<\/li><\/ul>\n<\/li><li>Understand WinRM configuration.\n<ul><li>Test if the WinRM Service is running using two different methods.<\/li><li>Check the Windows Firewall configuration to see if the rules to permit WinRM are enabled.<\/li><\/ul>\n<\/li><li>Local Administrator Accounts\n<ul><li>Determine if more than one user is a member of the Local Administrator group.<\/li><\/ul>\n<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#chaps-powersploit-security-checks\"><\/a><\/h3>\n\n\n\n<p><strong>PowerSploit Security Checks<\/strong><\/p>\n\n\n\n<p>The PowerSploit project (dev branch) can be used to gather additional information about the system. The <code>chaps-powersploit.ps1<\/code>\n script has been developed to gather this information. Of course, most \nanti-malware programs will prevent, protect, and alert on the use of \nPowerSploit. Therefore, the anti-malware should be disabled or the \nchaps-powersploit.ps1 script should not be used, <strong>NOTE<\/strong>: anti-malware programs should be re-enabled immediately upon verification that the script ran correctly.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#chaps-powersploitps1-todo\"><\/a><\/h4>\n\n\n\n<p class=\"has-text-align-center\"><strong>chaps-powersploit.ps1 TODO:<\/strong><\/p>\n\n\n\n<p>Here are a list of things that aren&#8217;t working, need to be addressed, or are possible function requests.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Needs to be tested in a Domain environment.<\/li><li>Handle errors gracefully.<\/li><li>Identify new cmdlets to run, such as <code><strong>Find-InterestingFiles<\/strong><\/code> with a list of specific files related to ICS project files.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#secure-baseline-checks---securing-windows-workstations\"><\/a><\/h3>\n\n\n\n<p><strong>Secure Baseline Checks &#8211; Securing Windows Workstations<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Check AppLocker <\/strong><ul><li>Determine if AppLocker is configured to monitor scripts, at a minimum. <\/li><\/ul><\/li><li><strong>Check EMET <\/strong><ul><li>If version is less than Windows 10, check that EMET service is running. <\/li><\/ul><\/li><li><strong>Deploy LAPS <\/strong><ul><li>Determine if LAPS is installed. <strong>NOTE<\/strong>: not checking if it is configured or used. <\/li><\/ul><\/li><li><strong>Force Group Policy to reapply settings during \u201crefresh\u201d <\/strong><ul><li>Determine how NoGPOListChanges is configured to see if GPOs are allied everytime they are checked. <\/li><\/ul><\/li><li><strong>Disable Net Session Enumeration <\/strong><ul><li><strong>NOTE<\/strong>: For now, extra actions are required to test this. See: <a href=\"https:\/\/gallery.technet.microsoft.com\/scriptcenter\/View-Net-Session-Enum-dfced139\">TechNet script NetSessEnumPerm.ps1<\/a> <\/li><\/ul><\/li><li><strong>Disable WPAD <\/strong><ul><li>Check for a WPAD entry in the Windows &#8220;etc\\hosts&#8221; file.<\/li><li>Check for the WpadOverride registry key.<\/li><li>Determine if the WinHTTPAutoProxySvc is running.<\/li><li>Check if the Windows Hotfix KB3165191 is installed.<\/li><li>Check WINS configuration.<\/li><li>Determine network adapter configurations for: <ul><li>DNSEnabledForWINSResolution<\/li><li>WINSEnableLMHostsLookup  <\/li><\/ul><\/li><\/ul><\/li><li><strong>Disable LLMNR <\/strong><ul><li>Detemine if DNSClient.EnableMulticast is disabled. <\/li><\/ul><\/li><li><strong>Disable Windows Browser Protocol <\/strong><ul><li>Determine if the Computer Browser service is running. <\/li><\/ul><\/li><li><strong>Disable NetBIOS <\/strong><ul><li>Check the setting of TcpipNetbiosOptions to determine if it is disabled. <\/li><\/ul><\/li><li><strong>Disable Windows Scripting <\/strong><ul><li>Check if Windows Scripting Host registry key is enabled.<\/li><li>Check if Windows Hotfix KB2871997 is installed.<\/li><li><strong>NOTE<\/strong>: not sure how to check &#8220;Control Scripting File Extensions&#8221; <\/li><\/ul><\/li><li><strong>Prevent Interactive Login <\/strong><ul><li>Check the configuration of registry key LocalAccountTokenFilterPolicy to see if it is disabled. <\/li><\/ul><\/li><li><strong>Disable WDigest <\/strong><ul><li>Check the configuration of registry key WDigest.UseLogonCredential to determine if it is disabled. <\/li><\/ul><\/li><li><strong>Disable SMBv1 <\/strong><ul><li>Use Get-SmbServerConfiguration to check: <ul><li>If SMBv1 is disabled.<\/li><li>If SMBv1 auditing is enabled.  <\/li><\/ul><\/li><\/ul><\/li><li><strong>Block Untrusted Fonts on Windows 10 <\/strong><ul><li>Check the registry key Kernel.MitigationOptions to determine if it is configured to block untrusted fonts. <\/li><\/ul><\/li><li><strong>Enable Credential \/ Device Guard on Windows 10 <\/strong><ul><li>Check if the Credential Guard or HVCI service is running. <strong>NOTE<\/strong>: not checking configuration settings.<\/li><li>Check if Device Guard is configured. <strong>NOTE<\/strong>: not checking configuration settings. <\/li><\/ul><\/li><li><strong>Secure LanMan Authentication <\/strong><ul><li>Check if the registry key Lsa.NoLmHash is enabled.<\/li><li>Check if the registry key Lsa.LmCompatibilityLevel is configured to &#8220;Send NTLMv2 response only. Refuse LM &amp; NTLM.&#8221;<\/li><li>Check if Anonymous Enumeration of domain is restricted.<\/li><li>Check if Anonymous Enumeration of local system is restricted. <\/li><\/ul><\/li><li><strong>Secure Microsoft Office <\/strong><ul><li>Not implemented at this time. <\/li><\/ul><\/li><li><strong>Restrict RPC Clients <\/strong><ul><li>Determine if remote RPC client access is restricted. <\/li><\/ul><\/li><li><strong>Configure NTLM session security <\/strong><ul><li>Check NTLM Session Server Security settings to determine if it requires NTLMv2 and 128-bit encryption.<\/li><li>Check NTLM Session Client Security settings to determine if it requires NTLMv2 and 128-bit encryption. <\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cutaway-security\/chaps#chaps-todo\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>TODO?<\/strong><\/p>\n\n\n\n<p>Here are a list of things that aren&#8217;t working, need to be addressed, or are possible function requests.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Issues <\/strong><ul><li>WMI remoting and firewall rules may be required by Vulnerability  scanning tools. Thus, if enabled, test for limiting to users and  specific systems.<\/li><li>Fix PowerShell version 2 check<\/li><li>Fix .NET version check. <ul><li>(Get-ChildItem &#8216;HKLM:\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP&#8217;  -Recurse -Error Action 0| Get-ItemProperty -Name Version -ErrorAction 0)  | Select-Object Version  <\/li><\/ul><\/li><\/ul><\/li><li><strong>Useful <\/strong><ul><li>Generate lines for reporting. <ul><li>Marked so another script can scan the result and build finding and recommendation sections for a report. <\/li><\/ul><\/li><li>Check for SYSMON Program.<\/li><li>Update checks so that they are Windows version specific. E.G. Windows 10, Windows 7, Windows 2018.<\/li><li>List Installed Programs (to include x86) and programs installed directly to C: drive<\/li><li>Detect and acquire version information for JAVA, flash, and Adobe. <\/li><\/ul><\/li><li><strong>Nice-To-Haves <\/strong><ul><li>Update with Domain tests, as a user specified option.<\/li><li>CMD-only (non-PowerShell) version.<\/li><li>Add checks from Carlos Perez&#8217;s HoneyBadger plugin. Must be converted from Ruby to PowerShell. <\/li><\/ul><\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/cutaway-security\/chaps\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer, cannot be installed. The purpose of this script is to run it on a server or workstation to collect configuration information about that system. The information collected can then be used to provide recommendations [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","fifu_image_alt":"CHAPS : Configuration Hardening Assessment PowerShell Script","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[557,2577],"class_list":["post-8332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-chaps","tag-powershell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CHAPS : Configuration Hardening Assessment PowerShell Script<\/title>\n<meta name=\"description\" content=\"CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/chaps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CHAPS : Configuration Hardening Assessment PowerShell Script\" \/>\n<meta property=\"og:description\" content=\"CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/chaps\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-14T07:43:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"CHAPS : Configuration Hardening Assessment PowerShell Script\",\"datePublished\":\"2020-01-14T07:43:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/\"},\"wordCount\":1567,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png\",\"keywords\":[\"CHAPS\",\"PowerShell\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/chaps\/\",\"name\":\"CHAPS : Configuration Hardening Assessment PowerShell Script\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png\",\"datePublished\":\"2020-01-14T07:43:25+00:00\",\"description\":\"CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/chaps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CHAPS : Configuration Hardening Assessment PowerShell Script","description":"CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/chaps\/","og_locale":"en_US","og_type":"article","og_title":"CHAPS : Configuration Hardening Assessment PowerShell Script","og_description":"CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer","og_url":"https:\/\/kalilinuxtutorials.com\/chaps\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-01-14T07:43:25+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/chaps\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/chaps\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"CHAPS : Configuration Hardening Assessment PowerShell Script","datePublished":"2020-01-14T07:43:25+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/chaps\/"},"wordCount":1567,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","keywords":["CHAPS","PowerShell"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/chaps\/","url":"https:\/\/kalilinuxtutorials.com\/chaps\/","name":"CHAPS : Configuration Hardening Assessment PowerShell Script","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","datePublished":"2020-01-14T07:43:25+00:00","description":"CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/chaps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/chaps\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-Dn5rN8uM0-s\/Xhzkx70tPuI\/AAAAAAAAEac\/Kuvmg698NyQqdp9F_l7WyM0iVwb8ZlTiwCLcBGAsYHQ\/s1600\/CHAPS%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36831,"url":"https:\/\/kalilinuxtutorials.com\/powershell-digital-forensics-and-incident-response\/","url_meta":{"origin":8332,"position":0},"title":"Powershell Digital Forensics And Incident Response","author":"Varshini","date":"March 4, 2025","format":false,"excerpt":"PowerShell has emerged as a vital tool in Digital Forensics and Incident Response (DFIR), offering robust capabilities for automating data collection, analysis, and containment during cybersecurity incidents. The PowerShell DFIR-Script.ps1 repository exemplifies how PowerShell can streamline forensic investigations on Windows systems. Key Features Of DFIR-Script.ps1 The DFIR-Script.ps1 is a PowerShell-based\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/How-VPN-Helps-Ensure-Internet-Security1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/How-VPN-Helps-Ensure-Internet-Security1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/How-VPN-Helps-Ensure-Internet-Security1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/How-VPN-Helps-Ensure-Internet-Security1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/How-VPN-Helps-Ensure-Internet-Security1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/How-VPN-Helps-Ensure-Internet-Security1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3936,"url":"https:\/\/kalilinuxtutorials.com\/dcomrade-powershell-dcom-applications\/","url_meta":{"origin":8332,"position":1},"title":"DCOMrade : Powershell script for enumerating vulnerable DCOM Applications","author":"R K","date":"February 21, 2019","format":false,"excerpt":"DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to work with Powershell 2.0 but will work with all versions above as well. The script currently supports the following\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38631,"url":"https:\/\/kalilinuxtutorials.com\/blacksanta-malware-a-stealthy-threat-targeting-recruiters-and-hr-teams\/","url_meta":{"origin":8332,"position":2},"title":"BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams","author":"0xSnow","date":"March 12, 2026","format":false,"excerpt":"A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment professionals. This attack is being operated by Russian-speaking threat actors and involves stealthy infection methods that begin with spear-phishing emails. These emails contain malicious files disguised as job applications, allowing attackers to silently infiltrate systems,\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/kalilinuxtutorials.com\/category\/news\/"},"img":{"alt_text":"BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAVJgU9OeSR4p3VAvxksnQMpee6OHxdPsOm5J5geCLjYN1TH47e_rdAdBDM55MkAmt1ChC3a9N3eQUAJIxszito0R7pjRYPfYzKyjxSUEFZmCNBb9L5xEsoJfsJK9fpnfdPD4bzQfsdwDrXlRFx3gnTpaMB9BrWOXMo6jVbZ4ruBAv60Dv1P224wGIq30\/s963\/blacksanta.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAVJgU9OeSR4p3VAvxksnQMpee6OHxdPsOm5J5geCLjYN1TH47e_rdAdBDM55MkAmt1ChC3a9N3eQUAJIxszito0R7pjRYPfYzKyjxSUEFZmCNBb9L5xEsoJfsJK9fpnfdPD4bzQfsdwDrXlRFx3gnTpaMB9BrWOXMo6jVbZ4ruBAv60Dv1P224wGIq30\/s963\/blacksanta.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAVJgU9OeSR4p3VAvxksnQMpee6OHxdPsOm5J5geCLjYN1TH47e_rdAdBDM55MkAmt1ChC3a9N3eQUAJIxszito0R7pjRYPfYzKyjxSUEFZmCNBb9L5xEsoJfsJK9fpnfdPD4bzQfsdwDrXlRFx3gnTpaMB9BrWOXMo6jVbZ4ruBAv60Dv1P224wGIq30\/s963\/blacksanta.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAVJgU9OeSR4p3VAvxksnQMpee6OHxdPsOm5J5geCLjYN1TH47e_rdAdBDM55MkAmt1ChC3a9N3eQUAJIxszito0R7pjRYPfYzKyjxSUEFZmCNBb9L5xEsoJfsJK9fpnfdPD4bzQfsdwDrXlRFx3gnTpaMB9BrWOXMo6jVbZ4ruBAv60Dv1P224wGIq30\/s963\/blacksanta.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5665,"url":"https:\/\/kalilinuxtutorials.com\/youzer-fake-user-active-directory\/","url_meta":{"origin":8332,"position":3},"title":"Youzer : Fake User Generator For Active Directory Environments","author":"R K","date":"July 9, 2019","format":false,"excerpt":"Fake User Generator for Active Directory Environments. The goal of Youzer is to create information rich Active Directory environments. This uses the python3 library 'faker' to generate random accounts. pip3 install faker You can either supply a wordlist or have the passwords generated. The generated option is great for testing\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/DIdFxF814AA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":8579,"url":"https:\/\/kalilinuxtutorials.com\/check-localadminhash\/","url_meta":{"origin":8332,"position":4},"title":"Check-LocalAdminHash : PowerShell Tool To Authenticate Multiple Hosts Over WMI Or SMB","author":"R K","date":"January 27, 2020","format":false,"excerpt":"Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":29734,"url":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","url_meta":{"origin":8332,"position":5},"title":"AD_Enumeration_Hunt &#8211; AD Pentesting Toolkit","author":"Varshini","date":"August 25, 2023","format":false,"excerpt":"Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment. The scripts cover various aspects of AD enumeration, user and group management, computer enumeration, network and security analysis, and more.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/8332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=8332"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/8332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16038"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=8332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=8332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=8332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}