A toolkit for discovering and enumerating Windows Server Update Services (WSUS) configurations and traffic within an Active Directory environment.
This repository currently includes two scripts:
wsusniff.py– A Python packet sniffer that detects and highlights WSUS HTTP/HTTPS traffic.wsuspider.sh– A Bash automation wrapper that spiders SYSVOL for WSUS-related Group Policy registry files, decodes them, and extracts WSUS configuration values.
- Listens on a given network interface.
- Detects WSUS-specific endpoints such as:
/SimpleAuthWebService/SimpleAuth.asmx/ClientWebService/Client.asmx
- Displays client ↔ server communication including:
- Source and destination IPs
- Requested URIs
- SOAP actions
- WSUS server hostnames and ports
- Useful for confirming which systems are communicating with WSUS and over what protocol/port.
- Automates discovery of WSUS policy configurations distributed via SYSVOL.
- Steps:
- Runs manspider against a target DC to collect
.pol(registry policy) files. - Decodes downloaded machine registry
.polfiles. - Parses WSUS-related registry keys, including:
WUServerWUStatusServerUseWUServerNoAutoUpdateAUOptions- Scheduling and frequency values
- Runs manspider against a target DC to collect
- Outputs a summary of discovered WSUS settings to both screen and
wsus_summary.txt.
python3 wsusniff.py -i <interface>./wsuspider.sh -dc-ip <DC_IP> -d <DOMAIN> -u <USER> -p <PASSWORD> [--no-banner]Results are saved to wsus_summary.txt