Commit Graph

318 Commits

Author SHA1 Message Date
clymb3r 6e56d40662 Update to latest Mimikatz (crash fix on Win7/8)
The latest version of Mimikatz fixes a crash that happens on Windows7/8
(and server versions) after installing the latest Windows updates.
2014-05-20 09:34:09 -07:00
Matt Graeber 67ed1d71b4 Merge pull request #44 from clymb3r/master
Updated to latest Mimikatz
2014-05-05 06:16:49 -04:00
clymb3r 794f55a82b Updated to latest Mimikatz
Latest version of Mimikatz now natively supports being reflectively
loaded by Invoke-ReflectivePEInjection, updating the script to take
advantage of this new version.
2014-05-04 18:49:37 -07:00
Matt Graeber 193b005357 Merge pull request #42 from clymb3r/master
Fixing error in script
2014-04-28 20:57:56 -07:00
clymb3r 364dde11e1 Fixing error in script 2014-04-28 20:45:20 -07:00
Matt Graeber 22f984c3f1 Merge pull request #41 from clymb3r/master
Updating Invoke-Mimikatz to Mimikatz 2.0 alpha
2014-04-19 07:46:51 -04:00
clymb3r d085c5b1d7 Fixing formatting 2014-04-16 21:16:02 -07:00
clymb3r f03ab1444d Fixing garbage put in by merge 2014-04-16 21:11:34 -07:00
clymb3r b783b459c1 Merge branch 'master' of https://github.com/mattifestation/PowerSploit
Conflicts:
	Recon/Get-ComputerDetails.ps1
	Recon/Recon.psd1
2014-04-16 21:02:50 -07:00
clymb3r 47b90647c1 Updating Invoke-Mimikatz to Mimikatz 2.0 alpha 2014-04-16 20:47:14 -07:00
Chris Campbell 946328cf9e Missing File Names
Added printers.xml and drives.xml to the search.
2014-03-21 13:22:33 -04:00
mattifestation 5fabddcf1d Fixed error in PowerSploit ADS removal one-liner 2014-03-16 10:09:52 -04:00
mattifestation 202e8f4b36 Adding internal recon/privesc privesc functions #40
Added the following recon functions written by Joe Bialek
(@JosephBialek):

- Find-4648Logons
- Find-4624Logons
- Find-AppLockerLogs
- Find-PSScriptsInPSAppLog
- Find-RDPClientConnections
- Get-ComputerDetails (Combines all of the above functions into a single
function)
2014-03-16 10:02:37 -04:00
Chris Campbell 1798918edf Bug fix of from v3 XML expanding to $Count
This bug fix was from @jakxx
2014-03-05 00:40:02 -05:00
Chris Campbell 49c9f04533 Update to version 2.4.0 from @jakxx
Removed unnecessary comment, merged update with printers.xml and drives.xml from @jackxx
2014-03-05 00:32:40 -05:00
clymb3r 77bcb336e0 Separating out functions & bug fix
All info gathering pieces of this script can now be called individually.
Fixed a bug where the user SID wasn't being converted to a username in
the RDP function.
2014-03-02 21:18:28 -08:00
mattifestation b450a70dbf Added Get-VolumeShadowCopy and Mount-VolumeShadowCopy 2014-03-01 18:26:31 -05:00
mattifestation 1df850208e Consolidated Persistence module functions into Persistence.psm1
It doesn't make sense to have these as separate ps1 files.
2014-02-23 10:35:55 -05:00
mattifestation bbd382e52a #31 Persistence module function nouns are now singular
The function names New-UserPersistenceOption and
New-ElevatedPersistenceOptionNew-ElevatedPersistenceOption now conform
to PowerShell naming best practices.
2014-02-23 10:35:55 -05:00
Matt Graeber 28790b5a08 Merge pull request #32 from obscuresec/master
Minor fixes for compatibility between versions
2014-02-21 23:26:21 -05:00
Chris Campbell 3047ccfe32 Update Get-GPPPassword.ps1 2014-02-21 22:37:23 -05:00
Chris Campbell 7ee66855f3 Update Get-GPPPassword.ps1 2014-02-21 22:34:11 -05:00
Chris Campbell 22572d6e7d Changed the direction of XML parsing
Used Select-XML to ensure compatibility with v2
2014-02-21 22:33:27 -05:00
Chris Campbell 770fe8ff10 Update Get-GPPPassword.ps1
Iterate version.
2014-02-21 15:26:49 -05:00
Chris Campbell 313d80373c Update Get-GPPPassword.ps1 2014-02-21 15:19:55 -05:00
Chris Campbell 261aaf6302 Update Get-GPPPassword.ps1
Bug fix of variables.
2014-02-21 15:09:43 -05:00
mattifestation 24fc1b6b6c Major Revision of Get-GPPPasswords
Thanks @obscuresec!
2014-02-21 05:59:58 -05:00
clymb3r 308042f493 Adding Get-ComputerDetails recon script
Get-ComputerDetails is a recon script which pulls a variety of useful
information off a computer which might later be useful by an attacker.
This includes:
Logons
AppLocker process start logs
PowerShell logs to find scripts run
RDP Client saved servers
2014-02-20 17:47:27 -08:00
mattifestation 22f0c1b13a Changed Inject-LogonCredentials name to Invoke-CredentialInjection 2014-02-12 19:44:12 -05:00
Matt Graeber 331d54eeaf Merge pull request #28 from clymb3r/master
Inject-LogonCredentials has been renamed to Invoke-CredentialInjection.
2014-02-12 19:40:32 -05:00
clymb3r b684da050a Inject-LogonCredentials has been renamed to Invoke-CredentialInjection.
Added a check to ensure the script isn't being run from Session0 with
the "NewWinLogon" flag. This flag does not work in Session0 because
winlogon.exe tries to load stuff from user32.dll which requires a
desktop is present. This is not possible in Session0 because there is no
desktop/GUI, so it causes winlogon to load and then immediately close
with error code c0000142 indicating a DLL failed to initialize. There is
no way to fix this that I know of, if you need to run the script from
Session0 use the "ExistingWinLogon" flag.
2014-02-12 13:52:41 -08:00
mattifestation 92fcfdc384 Add Get-Entropy 2014-02-03 18:37:36 -05:00
mattifestation c5168cdba6 Removed mimikatz.
This doesn't need to reside in PowerSploit. Those that are truly
paranoid should validate that the embedded executable in
Invoke-Mimikatz.ps1 is indeed mimikatz.

This was causing AV to flag upon downloading PowerSploit.
2014-02-03 17:13:41 -05:00
Matt Graeber d9ca5357e4 Merge pull request #26 from obscuresec/master
Update Invoke-ReverseDnsLookup.ps1
2014-01-30 14:38:50 -08:00
Chris Campbell 14780a5678 Update Invoke-ReverseDnsLookup.ps1
Added pipeline support and verbose statement.
2014-01-30 17:13:25 -05:00
mattifestation 7c51e9331b Generate a non-terminating error if there's a binding/framework version mismatch
The user should at least be made aware if they're using an unsupported
framework library version.
2014-01-25 11:48:53 -05:00
mattifestation 22cbc47642 Upgraded Capstone framework libs to 2.0
These are the compiled libs straight from
http://www.capstone-engine.org/download.html
2014-01-25 11:47:09 -05:00
mattifestation 7f0267db7c Disable non-standard cmdlet verb checking 2014-01-25 11:45:59 -05:00
mattifestation 3d564121d7 Capstone.dll returns the correct number of operands now. 2014-01-19 18:53:17 -05:00
mattifestation 5fede76351 Capstone module now incorporates framework 2.0RC1
* I also moved the contents of Get-CSDisassembly.ps1 into Capstone.psm1
2014-01-19 13:56:48 -05:00
Matt Graeber 4f5faf672f Merge pull request #25 from clymb3r/master
Bug fixes for Invoke-TokenManipulation
2014-01-11 15:02:48 -08:00
clymb3r bb41ab98ca Bug fixes for Invoke-TokenManipulation
Processes could not be started when the script was being run from
Session 0. The fix is to use the CreateProcessAsUserW function when
running in Session 0. This API requires SeAssignPrimaryTokenPrivilege
priviege, so for non-session0 calls I still use CreateProcessWithTokenW
which does not require special privileges.
2014-01-10 21:41:44 -08:00
mattifestation 5bca2c3087 Updated usage documentation 2014-01-04 07:54:06 -05:00
mattifestation c3cea2fb61 Updated C# Capstone binding to latest version 2014-01-04 07:53:49 -05:00
mattifestation 9f41edcf82 Fixes #23 - $Password was not being cleared 2014-01-01 13:10:06 -05:00
mattifestation 206fb70a0c Adding 64-bit lib file 2013-12-26 19:35:32 -05:00
mattifestation 7009f92ef3 Major update to Capstone disassembly module
* Refactor of C# capstone binding
* Now compatible in 32 and 64-bit PowerShell
2013-12-26 19:30:41 -05:00
mattifestation 7157507d99 Added Capstone Engine PowerShell binding
Consider this to be an alpha release until the C# binding is published.
2013-12-22 12:46:39 -05:00
mattifestation 46baff5ef2 Added Inject-LogonCredentials to README 2013-11-18 06:30:19 -05:00
Matt Graeber 7de1dd6df7 Merge pull request #21 from clymb3r/master
Adding Inject-LogonCredentials
2013-11-18 03:26:55 -08:00