Added ./Privesc/ folder that integrates PowerUp.ps1
Updated README.md's
This commit is contained in:
parent
5fb690518d
commit
8ab8c49a0d
File diff suppressed because one or more lines are too long
|
|
@ -0,0 +1,112 @@
|
||||||
|
@{
|
||||||
|
|
||||||
|
# Script module or binary module file associated with this manifest.
|
||||||
|
ModuleToProcess = 'Privesc.psm1'
|
||||||
|
|
||||||
|
# Version number of this module.
|
||||||
|
ModuleVersion = '1.0.0.0'
|
||||||
|
|
||||||
|
# ID used to uniquely identify this module
|
||||||
|
GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'
|
||||||
|
|
||||||
|
# Author of this module
|
||||||
|
Author = 'Will Schroder'
|
||||||
|
|
||||||
|
# Company or vendor of this module
|
||||||
|
CompanyName = ''
|
||||||
|
|
||||||
|
# Copyright statement for this module
|
||||||
|
Copyright = 'BSD 3-Clause'
|
||||||
|
|
||||||
|
# Description of the functionality provided by this module
|
||||||
|
Description = 'PowerSploit Privesc Module'
|
||||||
|
|
||||||
|
# Minimum version of the Windows PowerShell engine required by this module
|
||||||
|
PowerShellVersion = '2.0'
|
||||||
|
|
||||||
|
# Name of the Windows PowerShell host required by this module
|
||||||
|
# PowerShellHostName = ''
|
||||||
|
|
||||||
|
# Minimum version of the Windows PowerShell host required by this module
|
||||||
|
# PowerShellHostVersion = ''
|
||||||
|
|
||||||
|
# Minimum version of Microsoft .NET Framework required by this module
|
||||||
|
# DotNetFrameworkVersion = ''
|
||||||
|
|
||||||
|
# Minimum version of the common language runtime (CLR) required by this module
|
||||||
|
# CLRVersion = ''
|
||||||
|
|
||||||
|
# Processor architecture (None, X86, Amd64) required by this module
|
||||||
|
# ProcessorArchitecture = ''
|
||||||
|
|
||||||
|
# Modules that must be imported into the global environment prior to importing this module
|
||||||
|
# RequiredModules = @()
|
||||||
|
|
||||||
|
# Assemblies that must be loaded prior to importing this module
|
||||||
|
# RequiredAssemblies = @()
|
||||||
|
|
||||||
|
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
|
||||||
|
# ScriptsToProcess = @()
|
||||||
|
|
||||||
|
# Type files (.ps1xml) to be loaded when importing this module
|
||||||
|
# TypesToProcess = @()
|
||||||
|
|
||||||
|
# Format files (.ps1xml) to be loaded when importing this module
|
||||||
|
# FormatsToProcess = @()
|
||||||
|
|
||||||
|
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
|
||||||
|
# NestedModules = @()
|
||||||
|
|
||||||
|
# Functions to export from this module
|
||||||
|
FunctionsToExport = @(
|
||||||
|
'Get-ServiceUnquoted',
|
||||||
|
'Get-ServiceFilePermission',
|
||||||
|
'Get-ServicePermission',
|
||||||
|
'Get-ServiceDetail',
|
||||||
|
'Invoke-ServiceAbuse',
|
||||||
|
'Write-ServiceBinary',
|
||||||
|
'Install-ServiceBinary',
|
||||||
|
'Restore-ServiceBinary',
|
||||||
|
'Find-DLLHijack',
|
||||||
|
'Find-PathHijack',
|
||||||
|
'Write-HijackDll',
|
||||||
|
'Get-RegAlwaysInstallElevated',
|
||||||
|
'Get-RegAutoLogon',
|
||||||
|
'Get-VulnAutoRun',
|
||||||
|
'Get-VulnSchTask',
|
||||||
|
'Get-UnattendedInstallFile',
|
||||||
|
'Get-Webconfig',
|
||||||
|
'Get-ApplicationHost',
|
||||||
|
'Write-UserAddMSI',
|
||||||
|
'Invoke-AllChecks'
|
||||||
|
)
|
||||||
|
|
||||||
|
# Cmdlets to export from this module
|
||||||
|
CmdletsToExport = '*'
|
||||||
|
|
||||||
|
# Variables to export from this module
|
||||||
|
VariablesToExport = '*'
|
||||||
|
|
||||||
|
# Aliases to export from this module
|
||||||
|
AliasesToExport = '*'
|
||||||
|
|
||||||
|
# DSC resources to export from this module
|
||||||
|
# DscResourcesToExport = @()
|
||||||
|
|
||||||
|
# List of all modules packaged with this module
|
||||||
|
ModuleList = @(@{ModuleName = 'Privesc'; ModuleVersion = '1.0.0.0'; GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'})
|
||||||
|
|
||||||
|
# List of all files packaged with this module
|
||||||
|
FileList = 'Privesc.psm1', 'PowerUp.ps1', 'README.md'
|
||||||
|
|
||||||
|
# Private data to pass to the module specified in RootModule/ModuleToProcess
|
||||||
|
# PrivateData = ''
|
||||||
|
|
||||||
|
# HelpInfo URI of this module
|
||||||
|
# HelpInfoURI = ''
|
||||||
|
|
||||||
|
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
|
||||||
|
# DefaultCommandPrefix = ''
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
|
||||||
|
|
@ -0,0 +1,59 @@
|
||||||
|
To install this module, drop the entire Privesc folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable.
|
||||||
|
|
||||||
|
The default per-user module path is: "$Env:HomeDrive$Env:HOMEPATH\Documents\WindowsPowerShell\Modules"
|
||||||
|
The default computer-level module path is: "$Env:windir\System32\WindowsPowerShell\v1.0\Modules"
|
||||||
|
|
||||||
|
To use the module, type `Import-Module Privesc`
|
||||||
|
|
||||||
|
To see the commands imported, type `Get-Command -Module Privesc`
|
||||||
|
|
||||||
|
For help on each individual command, Get-Help is your friend.
|
||||||
|
|
||||||
|
Note: The tools contained within this module were all designed such that they can be run individually. Including them in a module simply lends itself to increased portability.
|
||||||
|
|
||||||
|
|
||||||
|
## PowerUp
|
||||||
|
|
||||||
|
PowerUp aims to be a clearinghouse of common Windows privilege escalation
|
||||||
|
vectors that rely on misconfigurations.
|
||||||
|
|
||||||
|
Running Invoke-AllChecks will output any identifiable vulnerabilities along
|
||||||
|
with specifications for any abuse functions. The -HTMLReport flag will also
|
||||||
|
generate a COMPUTER.username.html version of the report.
|
||||||
|
|
||||||
|
Author: @harmj0y
|
||||||
|
License: BSD 3-Clause
|
||||||
|
Required Dependencies: None
|
||||||
|
Optional Dependencies: None
|
||||||
|
|
||||||
|
|
||||||
|
### Service Enumeration:
|
||||||
|
Get-ServiceUnquoted - returns services with unquoted paths that also have a space in the name
|
||||||
|
Get-ServiceFilePermission - returns services where the current user can write to the service binary path or its config
|
||||||
|
Get-ServicePermission - returns services the current user can modify
|
||||||
|
Get-ServiceDetail - returns detailed information about a specified service
|
||||||
|
|
||||||
|
### Service Abuse:
|
||||||
|
Invoke-ServiceAbuse - modifies a vulnerable service to create a local admin or execute a custom command
|
||||||
|
Write-ServiceBinary - writes out a patched C# service binary that adds a local admin or executes a custom command
|
||||||
|
Install-ServiceBinary - replaces a service binary with one that adds a local admin or executes a custom command
|
||||||
|
Restore-ServiceBinary - restores a replaced service binary with the original executable
|
||||||
|
|
||||||
|
### DLL Hijacking:
|
||||||
|
Find-DLLHijack - finds .dll hijacking opportunities for currently running processes
|
||||||
|
Find-PathHijack - finds service %PATH% .dll hijacking opportunities
|
||||||
|
Write-HijackDll - writes out a hijackable .dll
|
||||||
|
|
||||||
|
### Registry Checks:
|
||||||
|
Get-RegAlwaysInstallElevated - checks if the AlwaysInstallElevated registry key is set
|
||||||
|
Get-RegAutoLogon - checks for Autologon credentials in the registry
|
||||||
|
Get-VulnAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns
|
||||||
|
|
||||||
|
### Misc.:
|
||||||
|
Get-VulnSchTask - find schtasks with modifiable target files
|
||||||
|
Get-UnattendedInstallFile - finds remaining unattended installation files
|
||||||
|
Get-Webconfig - checks for any encrypted web.config strings
|
||||||
|
Get-ApplicationHost - checks for encrypted application pool and virtual directory passwords
|
||||||
|
Write-UserAddMSI - write out a MSI installer that prompts for a user to be added
|
||||||
|
Invoke-AllChecks - runs all current escalation checks and returns a report
|
||||||
|
|
||||||
12
README.md
12
README.md
|
|
@ -135,6 +135,14 @@ Proof of concept code that overwrites the master boot record with the
|
||||||
|
|
||||||
Causes your machine to blue screen upon exiting PowerShell.
|
Causes your machine to blue screen upon exiting PowerShell.
|
||||||
|
|
||||||
|
## Privesc
|
||||||
|
|
||||||
|
**Tools to help with escalating privileges on a target.**
|
||||||
|
|
||||||
|
#### `PowerUp`
|
||||||
|
|
||||||
|
Clearing house of common privilege escalation checks, along with some weaponization vectors.
|
||||||
|
|
||||||
## Recon
|
## Recon
|
||||||
|
|
||||||
**Tools to aid in the reconnaissance phase of a penetration test.**
|
**Tools to aid in the reconnaissance phase of a penetration test.**
|
||||||
|
|
@ -151,6 +159,10 @@ Returns the HTTP Status Codes and full URL for specified paths when provided wit
|
||||||
|
|
||||||
Scans an IP address range for DNS PTR records. This script is useful for performing DNS reconnaissance prior to conducting an authorized penetration test.
|
Scans an IP address range for DNS PTR records. This script is useful for performing DNS reconnaissance prior to conducting an authorized penetration test.
|
||||||
|
|
||||||
|
#### `PowerView`
|
||||||
|
|
||||||
|
PowerView is series of functions that performs network and Windows domain enumeration and exploitation.
|
||||||
|
|
||||||
## Recon\Dictionaries
|
## Recon\Dictionaries
|
||||||
|
|
||||||
**A collection of dictionaries used to aid in the reconnaissance phase of a penetration test. Dictionaries were taken from the following sources.**
|
**A collection of dictionaries used to aid in the reconnaissance phase of a penetration test. Dictionaries were taken from the following sources.**
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue