mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-12-23 01:21:03 +01:00
191 lines
11 KiB
Markdown
191 lines
11 KiB
Markdown
## Windows penetration testing related scripts, tools and Cheatsheets
|
|
|
|
|
|
- **`awareness.bat`** - Little and quick Windows Situational-Awareness set of commands to execute after gaining initial foothold (coming from APT34: https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html ) ([gist](https://gist.github.com/mgeeky/237b48e0bb6546acb53696228ab50794))
|
|
|
|
- **`Find-CLSIDForProgID.ps1`** - Tries to locate COM object's `ProgID` based on a given CLSID.
|
|
|
|
- **`find-system-and-syswow64-binaries.py`** - Finds files with specified extension in both System32 and SysWOW64 and then prints their intersection. Useful for finding executables (for process injection purposes) that reside in both directories (such as `WerFault.exe`)
|
|
|
|
|
|
- **`findSymbols.py`** - Script that recursively searches through PE files, scans their Imports and Exports and returns those matching filter criterias (like imported from specified module, name regexes, etc.). Uses `multiprocessing` to process files in parallel, dramatically cutting scan time in large directories.
|
|
|
|
```
|
|
:: findSymbols.py - Finds PE Import/Exports based on supplied filters.
|
|
|
|
Mariusz Banach / mgeeky, '21
|
|
<mb [at] binary-offensive.com>
|
|
|
|
usage: .\findSymbols.py [options] <path>
|
|
|
|
positional arguments:
|
|
path Path to a PE file or directory.
|
|
|
|
optional arguments:
|
|
-h, --help show this help message and exit
|
|
-r, --recurse If <path> is a directory, perform recursive scan.
|
|
-v, --verbose Verbose mode.
|
|
-f {text,json}, --format {text,json}
|
|
Output format. Text or JSON.
|
|
-E EXTENSION, --extension EXTENSION
|
|
Extensions of files to scan. By default will scan all files. Can be repeated: -E exe -E dll
|
|
-o PATH, --output PATH
|
|
Write output to file.
|
|
-C, --color Add colors to text output. May uglify table text output
|
|
|
|
Output sorting:
|
|
-u, --unique Return unique symbols only. The first symbol with a name that occurs in results, will be returned.
|
|
-d, --descending Sort in descending order instead of default of descending.
|
|
-c COLUMN, --column COLUMN
|
|
Sort by this column name. Default: filename. Available columns: "filename", "symbol type", "module", "symbol", "file size", "path"
|
|
-n NUM, --first NUM Show only first N results, as specified in this paremeter. By default will show all candidates.
|
|
|
|
Output filtering:
|
|
-i, --imports Filter only Imports.
|
|
-e, --exports Filter only Exports.
|
|
-s NAME, --name NAME Search for symbols with name matching this regular expression. Can be repeated, case insensitive
|
|
-S NOT_NAME, --not-name NOT_NAME
|
|
Search for symbols with name NOT matching this regular expression.
|
|
-m MODULE, --module MODULE
|
|
Search for symbols exported in/imported from this module matching regular expression.
|
|
-M NOT_MODULE, --not-module NOT_MODULE
|
|
Search for symbols NOT exported in/NOT imported from this module matching regular expression.
|
|
```
|
|
|
|
Example run:
|
|
```
|
|
cmd> py findSymbols.py "c:\Program Files\Microsoft Office" -e -r -u -s exec -s launch -s run -s process -s eval -s dcom -s dde -s pipe
|
|
```
|
|
|
|
Searches for unique exports in MS Office PE executables matching any of `'exec','launch','run','process','eval','dcom','dde','pipe'` regular expressions in their names.
|
|
|
|
```
|
|
[...]
|
|
|
|
| 565 | PRIVATE_ODBC32.dll | export | PRIVATE_ODBC32.dll | SQLExecDirect | 734088 | c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for |
|
|
| | | | | | | Excel Integrated\bin\PRIVATE_ODBC32.dll |
|
|
| 566 | PRIVATE_ODBC32.dll | export | PRIVATE_ODBC32.dll | SQLExecDirectA | 734088 | c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for |
|
|
| | | | | | | Excel Integrated\bin\PRIVATE_ODBC32.dll |
|
|
| 567 | PRIVATE_ODBC32.dll | export | PRIVATE_ODBC32.dll | SQLExecDirectW | 734088 | c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for |
|
|
| | | | | | | Excel Integrated\bin\PRIVATE_ODBC32.dll |
|
|
| 568 | PRIVATE_ODBC32.dll | export | PRIVATE_ODBC32.dll | SQLExecute | 734088 | c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for |
|
|
| | | | | | | Excel Integrated\bin\PRIVATE_ODBC32.dll |
|
|
|
|
[...]
|
|
```
|
|
|
|
|
|
- **`Force-PSRemoting.ps1`** - Forcefully enable WinRM / PSRemoting. [gist](https://gist.github.com/mgeeky/313c22def5c86d7a529f41e5b6ff79b8)
|
|
|
|
- **`GlobalProtectDisable.cpp`** - Global Protect VPN Application patcher allowing the Administrator user to disable VPN without Passcode. ([gist](https://gist.github.com/mgeeky/54ac676226a1a4bd9fd8653e24adc2e9))
|
|
|
|
Currently supported versions:
|
|
- 3.1.6.19
|
|
- 5.0.3.29
|
|
- 5.1.3.12
|
|
- 5.2.8.23
|
|
|
|
Steps are following:
|
|
|
|
1. Launch the application as an Administrator
|
|
2. Read instructions carefully and press OK
|
|
3. Right-click on GlobalProtect tray-icon
|
|
4. Select "Disable"
|
|
5. Enter some random meaningless password
|
|
|
|
After those steps - the GlobalProtect will disable itself cleanly.
|
|
From now on, the GlobalProtect will remain disabled until you reboot the machine (or restart the PanGPA.exe process or PanGPS service).
|
|
|
|
- **`impacket-binaries.sh`** - Simple one-liner that downloads all of the Windows EXE impacket binaries put out in [Impacket Binaries](https://github.com/ropnop/impacket_static_binaries) repo. [gist](https://gist.github.com/mgeeky/2f990f14f1e7cf78fce21b8761234604)
|
|
|
|
- **`PE-library`** - Simple, lightweight PE (Windows Portable Executable format) structures parsing library that I'm using in my various projects.
|
|
|
|
- **`pth-carpet.py`** - Pass-The-Hash Carpet Bombing utility - trying every provided hash against every specified machine. ([gist](https://gist.github.com/mgeeky/3018bf3643f80798bde75c17571a38a9))
|
|
|
|
- **`rdpFileUpload.py`** - RDP file upload utility via Keyboard emulation. Uploads specified input file or directory, encodes it and retypes encoded contents by emulating keyboard keypresses into previously focused RDP session window. That will effectively transmit contents of the file onto the remote host without use of any sort of built-in file upload functionality. Remote desktop protocols such as RDP/VNC could be abused in this way by smuggling to the connected host implant files, etc. In case a directory was specified on input, will recursively add every file from that directory and create a Zip archive that will be later uploaded. Average transfer bandwidths largely depend on your connectivity performance and system utilization.
|
|
I've experienced following:
|
|
* transfer to the Citrix Receiver RDP session: `40-60 bytes/s`
|
|
* transfer to LAN RDP session RDP session: `400-800 bytes/s`
|
|
|
|
Use `--verbose` for additional _field steps explanation_ output.
|
|
|
|
Sample usage:
|
|
|
|
```powershell
|
|
PS> python3 rdpFileUpload.py -v -f certutil README.md
|
|
|
|
:: RDP file upload utility via Keyboard emulation.
|
|
Takes an input file/folder and retypes it into focused RDP session window.
|
|
That effectively uploads the file into remote host over a RDP channel.
|
|
|
|
Mariusz Banach / mgeeky '20, (@mariuszbit)
|
|
<mb@binary-offensive.com>
|
|
|
|
[+] Will upload file's contents: "README.md"
|
|
|
|
[+] MD5 checksum of file to be uploaded: 442949e7bef67384161b511c2dd3e6bb
|
|
[+] MD5 checksum of encoded data to be retyped: 667fee7e6528bbd07075e2e54f7fee69
|
|
[.] Size of input file: 4993 - keys to retype: 6926
|
|
[*] Inter-key press interval: 5 miliseconds.
|
|
[*] Every chunk cooldown delay: 0.5 miliseconds.
|
|
[*]
|
|
================================================================
|
|
A) How to proceed now:
|
|
|
|
1) In your RDP session, spawn a text editor (notepad, vim)
|
|
2) Click inside of a text area as you were about to write something.
|
|
3) Leave your mouse cursor in that RDP session window (client) having that window focused
|
|
|
|
[.] Do not use your mouse/keyboard until file upload is completed!
|
|
|
|
[+] We're about to initiate upload process.
|
|
[.] Waiting 10 seconds before we begin...
|
|
|
|
[+] Starting file retype/upload...
|
|
[*] Mouse position of assumed RDP session window: Point(x=2422, y=1142)
|
|
|
|
100%|███████████████████████████████████████████████████████████████████| 6926/6926 [01:07<00:00, 45.52characters/s]
|
|
|
|
[+] FILE UPLOADED.
|
|
[*]
|
|
================================================================
|
|
B) After file was uploaded, next steps are:
|
|
|
|
*) Using your text editor: save the file in a remote system as "README.md.b64"
|
|
|
|
*) Verify MD5 sum of retyped file to base value 667fee7e6528bbd07075e2e54f7fee69:
|
|
$ md5sum README.md.b64
|
|
or
|
|
PS> Get-FileHash .\README.md.b64 -Algorithm MD5
|
|
|
|
*) Base64 decode file using certutil:
|
|
cmd> certutil -decode README.md.b64 README.md
|
|
|
|
*) Verify MD5 sum of final form of uploaded file to expected original value 442949e7bef67384161b511c2dd3e6bb:
|
|
$ md5sum README.md
|
|
or
|
|
PS> Get-FileHash .\README.md -Algorithm MD5
|
|
```
|
|
|
|
- **`revshell.c`** - Utterly simple reverse-shell, ready to be compiled by `mingw-w64` on Kali. No security features attached, completely not OPSEC-safe.
|
|
|
|
- [**`ShellcodeFluctuation`**](https://github.com/mgeeky/ShellcodeFluctuation) - An in-memory evasion technique fluctuating shellcode memory protection between RW & RX and encrypting/decrypting contents.
|
|
|
|
- **`Simulate-DNSTunnel.ps1`** - Performs DNS Tunnelling simulation for purpose of triggering installed Network IPS and IDS systems, generating SIEM offenses and picking up Blue Teams.
|
|
|
|
- [**`ThreadStackSpoofer`**](https://github.com/mgeeky/ThreadStackSpoofer) - A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory.
|
|
|
|
- **`UnhookMe`** - Dynamically unhooking imports resolver. Implementation of dynamic imports resolver that would be capable of unhooking used functions in-the-fly is yet another step towards strengthening adversary resilience efforts.
|
|
|
|
```
|
|
[~] Resolved symbol kernel32.dll!CreateFileA
|
|
[~] Resolved symbol kernel32.dll!ReadProcessMemory
|
|
[~] Resolved symbol kernel32.dll!MapViewOfFile
|
|
[~] Resolved symbol kernel32.dll!VirtualProtectEx
|
|
[#] Found trampoline hook in symbol: MessageBoxW . Restored original bytes from file.
|
|
[~] Resolved symbol user32.dll!MessageBoxW
|
|
```
|
|
|
|
|
|
- **`win-clean-logs.bat`** - Batch script to hide malware execution from Windows box. Source: Mandiant M-Trends 2017. ([gist](https://gist.github.com/mgeeky/3561be7e697c62f543910851c0a26d00))
|