Commit Graph

32 Commits

Author SHA1 Message Date
HarmJ0y eae4695b13 PowerUp update:
-Standardized documentation, including adding output object types and required dependencies to all functions
-Added Get-ProcessTokenPrivilege to enumerate the current (or remote) process token privileges, replacing Get-CurrentUserTokenGroupSid
-Added Enable-Privilege to enable privileges using RtlAdjustPrivilege
-Added @enigma0x3's Invoke-WScriptUACBypass function
-Renamed Invoke-AllChecks to Invoke-PrivescAudit, added alias mapping
-Added tests for Get-ProcessTokenPrivilege, Enable-Privilege, and Invoke-WScriptUACBypass
-Renamed helper functions for consistency
-Passes PSScriptAnalyzer!
2016-12-12 14:25:20 -05:00
HarmJ0y 031a7561c6 removed Pester test for non-exported Invoke-ThreadedFunction function 2016-12-12 13:30:07 -05:00
HarmJ0y 422cd612f6 removed Set-MacAttribute Pester tests 2016-12-12 13:13:29 -05:00
Harmj0y 8dea905998 Fixed bug in Get-ModifiablePath that resulted in spaces being expanded to the current directory location
Fixed other logic bugs in Get-ModifiablePath
Fixed bug in Add-ServiceDacl when the [ServiceProcess.ServiceController] wasn't loaded yet by Get-Service
Error handling for Get-CachedGPPPassword
Changed some Write-Warnings to Write-Verbose
Updated Privesc Pester tests for PowerUp
2016-06-23 17:51:17 -04:00
Harmj0y 5f8d8b0a10 Addded Get-CachedGPPPassword to PowerUp, based almost entirely on Get-GPPPassword.
Added Pester tests for Get-CachedGPPPassword.
2016-06-06 15:37:52 -04:00
Harmj0y e83cfae798 Get-ModifiablePath now also checks parent folders of files for modification
Bug fixes
Corrected PowerUp Pester tests
Changed 'Path' field to 'ModifiablePath' in 'Get-ModifiablePath'
Get-ServiceUnquoted now filters paths through Get-ModifiablePath
2016-06-04 22:06:21 -04:00
Harmj0y 4915945292 Renamed Get-RegistryAutoRun to Get-ModifiableRegistryAutoRun
Renamed Find-PathHijack to Find-PathDLLHijack
Fixed exposed functions in PowerSploit.psd1
2016-06-04 19:07:28 -04:00
Harmj0y 1b359e7875 Overhauled and completed PowerUp/Privesc Pester tests 2016-06-04 17:47:10 -04:00
sixdub debe4a565e Added Get-MicrophoneAudio.ps1 and associated Pester tests 2016-05-12 10:58:27 -04:00
Harmj0y 6a17f759ab Added Get-System to Privesc/
Added Pester tests for Get-System
2016-03-11 17:45:46 -05:00
Harmj0y 6de1d78af8 Added Pester tests for Get-SiteListPassword
Encrypted password check for Get-SiteListPassword fields
2016-02-12 17:25:13 -05:00
HarmJ0y 43c4c69b38 Merge pull request #108 from sagishahar/master
Add 'CanRestart' to output and Pester tests
2016-01-25 15:19:20 -08:00
Jesse Davis 9cc65e4a85 Fixed Pester/PassThru 2016-01-13 22:32:44 -06:00
Jesse Davis 75548931ba Fixed Pester/PassThru 2016-01-13 22:30:38 -06:00
Jesse Davis 414daa60b8 Fixed Pester/PassThru 2016-01-13 22:19:06 -06:00
Jesse Davis 759bd481ae Fixed Pester/PassThru 2016-01-13 21:02:50 -06:00
sagishahar 5f13c7b4de Add 'CanRestart' to output and Pester tests
Pester tests to the function 'Test-ServiceDaclPermission' were added in
order to increase confidence in its reliability. In general, my
intention was to replace the current functionality of the service
management functions such as Invoke-ServiceStart, to not use blindly
'sc.exe start' but rather consult with the DACL permissions and base the
decision on that. Unforunately, further investigation lead me to the
conclusion that retrieval of the service's DACL permissions requires
that an additional DACL permission (RC) be set. This may lead to an edge
case that could miss a potential privilege escalation condition and
thereby the original idea was discarded. Nonetheless,
'Test-ServiceDaclPermission' can be used for less critical tasks.
Therefore, a 'CanRestart' property was added to the output of the
service enumeration functions such as 'Get-ServiceUnquoted' as I think
that it will add value to redteamers/pentesters by helping them
prioritise which service should be abused for escalation of privileges.
Services that can be restarted by a low privileged user will probably be
prioritised first. Additionally, manual checking whether the vulnerable
service can be restarted would not be required in most cases.
2016-01-13 01:36:23 +08:00
Jesse Davis ef887af9d6 Update Exfiltration.tests.ps1 2016-01-09 17:55:47 -06:00
Jesse Davis f66e219bd6 new Get-Keystrokes 2016-01-09 17:50:58 -06:00
Matt Graeber 52c46b1d3a Revert "Invoke-ReflectivePEInjection test harnesses updated"
This reverts commit 98ebc1b0b8.
2015-12-17 20:30:04 -08:00
Matt Graeber 98ebc1b0b8 Invoke-ReflectivePEInjection test harnesses updated
Affected test harness PEs were updated to work in XP. Addresses issue
#100
2015-12-17 18:50:15 -08:00
Matt Graeber 924103aa01 Invoke-DllInjection Pester test improvement
The test dll I now use is advpack.dll since that is present in all
versions of windows.
2015-12-14 20:43:51 -08:00
Harmj0y 9ffc26af70 Added admin rights check for existing Privesc Pester tests 2015-12-14 19:33:15 -05:00
Harmj0y 5690b09027 Get-NetDomain now not called if -ComputerName or -ComputerFile are passed for meta functions, in order to prevent failure when running on a non-domain joined machine
took out FQDN Pester tests from Recon.tests.ps1 that used $env:userdnsdomain
2015-12-14 19:01:10 -05:00
Harmj0y e2993b63aa Modified Tests/Privesc.tests.ps1 to ensure file artifacts are not left on disk. 2015-12-14 18:19:17 -05:00
Harmj0y a235313996 Modified Tests/Recon.tests.ps1 to ensure file artifacts are not left on disk. 2015-12-14 17:34:12 -05:00
Harmj0y e44df184a8 Start of Recon/PowerView Pester tests 2015-12-03 21:57:41 -05:00
Harmj0y c143dc6885 Privesc/PowerUp Pester tests 2015-12-03 21:57:26 -05:00
Matt Graeber c03965c8f9 Adding Pester tests for CodeExecution module 2015-11-09 10:56:34 -08:00
Matt Graeber a78b40429e Revert "Excluding the Tests folder from being loaded as a module"
This reverts commit a0ab599810.
2015-11-09 10:52:41 -08:00
Matt Graeber a0ab599810 Excluding the Tests folder from being loaded as a module 2015-11-09 10:52:23 -08:00
Matt Graeber 641eff706e Test: Ensure all scripts are not LE Unicode encoded 2015-11-05 10:36:17 -05:00