clean up rdp module
parent
5f0ed02364
commit
9598e971da
|
@ -73,23 +73,23 @@ class NXCModule:
|
||||||
if self.method == "smb":
|
if self.method == "smb":
|
||||||
context.log.info("Executing over SMB(ncacn_np)")
|
context.log.info("Executing over SMB(ncacn_np)")
|
||||||
try:
|
try:
|
||||||
smb_rdp = rdp_SMB(context, connection)
|
smb_rdp = RdpSmb(context, connection)
|
||||||
if "ram" in self.action:
|
if "ram" in self.action:
|
||||||
smb_rdp.rdp_RAMWrapper(self.action)
|
smb_rdp.rdp_ram_wrapper(self.action)
|
||||||
else:
|
else:
|
||||||
smb_rdp.rdp_Wrapper(self.action)
|
smb_rdp.rdp_wrapper(self.action)
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
context.log.fail(f"Enable RDP via smb error: {str(e)}")
|
context.log.fail(f"Enable RDP via smb error: {str(e)}")
|
||||||
elif self.method == "wmi":
|
elif self.method == "wmi":
|
||||||
context.log.info("Executing over WMI(ncacn_ip_tcp)")
|
context.log.info("Executing over WMI(ncacn_ip_tcp)")
|
||||||
|
|
||||||
wmi_rdp = rdp_WMI(context, connection, self.dcom_timeout)
|
wmi_rdp = RdpWmi(context, connection, self.dcom_timeout)
|
||||||
|
|
||||||
if hasattr(wmi_rdp, '_rdp_WMI__iWbemLevel1Login'):
|
if hasattr(wmi_rdp, '_rdp_WMI__iWbemLevel1Login'):
|
||||||
if "ram" in self.action:
|
if "ram" in self.action:
|
||||||
# Nt version under 6 not support RAM.
|
# Nt version under 6 not support RAM.
|
||||||
try:
|
try:
|
||||||
wmi_rdp.rdp_RAMWrapper(self.action)
|
wmi_rdp.rdp_ram_wrapper(self.action)
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
if "WBEM_E_NOT_FOUND" in str(e):
|
if "WBEM_E_NOT_FOUND" in str(e):
|
||||||
context.log.fail("System version under NT6 not support restricted admin mode")
|
context.log.fail("System version under NT6 not support restricted admin mode")
|
||||||
|
@ -98,7 +98,7 @@ class NXCModule:
|
||||||
pass
|
pass
|
||||||
else:
|
else:
|
||||||
try:
|
try:
|
||||||
wmi_rdp.rdp_Wrapper(self.action, self.oldSystem)
|
wmi_rdp.rdp_wrapper(self.action, self.oldSystem)
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
if "WBEM_E_INVALID_NAMESPACE" in str(e):
|
if "WBEM_E_INVALID_NAMESPACE" in str(e):
|
||||||
context.log.fail('Looks like target system version is under NT6, please add "OLD=true" in module options.')
|
context.log.fail('Looks like target system version is under NT6, please add "OLD=true" in module options.')
|
||||||
|
@ -107,76 +107,77 @@ class NXCModule:
|
||||||
pass
|
pass
|
||||||
wmi_rdp._rdp_WMI__dcom.disconnect()
|
wmi_rdp._rdp_WMI__dcom.disconnect()
|
||||||
|
|
||||||
class rdp_SMB:
|
|
||||||
|
class RdpSmb:
|
||||||
def __init__(self, context, connection):
|
def __init__(self, context, connection):
|
||||||
self.context = context
|
self.context = context
|
||||||
self.__smbconnection = connection.conn
|
self.__smbconnection = connection.conn
|
||||||
self.__execute = connection.execute
|
self.__execute = connection.execute
|
||||||
self.logger = context.log
|
self.logger = context.log
|
||||||
|
|
||||||
def rdp_Wrapper(self, action):
|
def rdp_wrapper(self, action):
|
||||||
remoteOps = RemoteOperations(self.__smbconnection, False)
|
remote_ops = RemoteOperations(self.__smbconnection, False)
|
||||||
remoteOps.enableRegistry()
|
remote_ops.enableRegistry()
|
||||||
|
|
||||||
if remoteOps._RemoteOperations__rrp:
|
if remote_ops._RemoteOperations__rrp:
|
||||||
ans = rrp.hOpenLocalMachine(remoteOps._RemoteOperations__rrp)
|
ans = rrp.hOpenLocalMachine(remote_ops._RemoteOperations__rrp)
|
||||||
regHandle = ans["phKey"]
|
regHandle = ans["phKey"]
|
||||||
|
|
||||||
ans = rrp.hBaseRegOpenKey(
|
ans = rrp.hBaseRegOpenKey(
|
||||||
remoteOps._RemoteOperations__rrp,
|
remote_ops._RemoteOperations__rrp,
|
||||||
regHandle,
|
regHandle,
|
||||||
"SYSTEM\\CurrentControlSet\\Control\\Terminal Server",
|
"SYSTEM\\CurrentControlSet\\Control\\Terminal Server",
|
||||||
)
|
)
|
||||||
keyHandle = ans["phkResult"]
|
key_handle = ans["phkResult"]
|
||||||
|
|
||||||
ans = rrp.hBaseRegSetValue(
|
ans = rrp.hBaseRegSetValue(
|
||||||
remoteOps._RemoteOperations__rrp,
|
remote_ops._RemoteOperations__rrp,
|
||||||
keyHandle,
|
key_handle,
|
||||||
"fDenyTSConnections",
|
"fDenyTSConnections",
|
||||||
rrp.REG_DWORD,
|
rrp.REG_DWORD,
|
||||||
0 if action == "enable" else 1,
|
0 if action == "enable" else 1,
|
||||||
)
|
)
|
||||||
|
|
||||||
rtype, data = rrp.hBaseRegQueryValue(remoteOps._RemoteOperations__rrp, keyHandle, "fDenyTSConnections")
|
rtype, data = rrp.hBaseRegQueryValue(remote_ops._RemoteOperations__rrp, key_handle, "fDenyTSConnections")
|
||||||
|
|
||||||
if int(data) == 0:
|
if int(data) == 0:
|
||||||
self.logger.success("Enable RDP via SMB(ncacn_np) successfully")
|
self.logger.success("Enable RDP via SMB(ncacn_np) successfully")
|
||||||
elif int(data) == 1:
|
elif int(data) == 1:
|
||||||
self.logger.success("Disable RDP via SMB(ncacn_np) successfully")
|
self.logger.success("Disable RDP via SMB(ncacn_np) successfully")
|
||||||
|
|
||||||
self.firewall_CMD(action)
|
self.firewall_cmd(action)
|
||||||
|
|
||||||
if action == "enable":
|
if action == "enable":
|
||||||
self.query_RDPPort(remoteOps, regHandle)
|
self.query_rdp_port(remote_ops, regHandle)
|
||||||
try:
|
try:
|
||||||
remoteOps.finish()
|
remote_ops.finish()
|
||||||
except:
|
except Exception:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def rdp_RAMWrapper(self, action):
|
def rdp_ram_wrapper(self, action):
|
||||||
remoteOps = RemoteOperations(self.__smbconnection, False)
|
remote_ops = RemoteOperations(self.__smbconnection, False)
|
||||||
remoteOps.enableRegistry()
|
remote_ops.enableRegistry()
|
||||||
|
|
||||||
if remoteOps._RemoteOperations__rrp:
|
if remote_ops._RemoteOperations__rrp:
|
||||||
ans = rrp.hOpenLocalMachine(remoteOps._RemoteOperations__rrp)
|
ans = rrp.hOpenLocalMachine(remote_ops._RemoteOperations__rrp)
|
||||||
regHandle = ans["phKey"]
|
reg_handle = ans["phKey"]
|
||||||
|
|
||||||
ans = rrp.hBaseRegOpenKey(
|
ans = rrp.hBaseRegOpenKey(
|
||||||
remoteOps._RemoteOperations__rrp,
|
remote_ops._RemoteOperations__rrp,
|
||||||
regHandle,
|
reg_handle,
|
||||||
"System\\CurrentControlSet\\Control\\Lsa",
|
"System\\CurrentControlSet\\Control\\Lsa",
|
||||||
)
|
)
|
||||||
keyHandle = ans["phkResult"]
|
key_handle = ans["phkResult"]
|
||||||
|
|
||||||
rrp.hBaseRegSetValue(
|
rrp.hBaseRegSetValue(
|
||||||
remoteOps._RemoteOperations__rrp,
|
remote_ops._RemoteOperations__rrp,
|
||||||
keyHandle,
|
key_handle,
|
||||||
"DisableRestrictedAdmin",
|
"DisableRestrictedAdmin",
|
||||||
rrp.REG_DWORD,
|
rrp.REG_DWORD,
|
||||||
0 if action == "enable-ram" else 1,
|
0 if action == "enable-ram" else 1,
|
||||||
)
|
)
|
||||||
|
|
||||||
rtype, data = rrp.hBaseRegQueryValue(remoteOps._RemoteOperations__rrp, keyHandle, "DisableRestrictedAdmin")
|
rtype, data = rrp.hBaseRegQueryValue(remote_ops._RemoteOperations__rrp, key_handle, "DisableRestrictedAdmin")
|
||||||
|
|
||||||
if int(data) == 0:
|
if int(data) == 0:
|
||||||
self.logger.success("Enable RDP Restricted Admin Mode via SMB(ncacn_np) succeed")
|
self.logger.success("Enable RDP Restricted Admin Mode via SMB(ncacn_np) succeed")
|
||||||
|
@ -184,25 +185,25 @@ class rdp_SMB:
|
||||||
self.logger.success("Disable RDP Restricted Admin Mode via SMB(ncacn_np) succeed")
|
self.logger.success("Disable RDP Restricted Admin Mode via SMB(ncacn_np) succeed")
|
||||||
|
|
||||||
try:
|
try:
|
||||||
remoteOps.finish()
|
remote_ops.finish()
|
||||||
except:
|
except Exception:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def query_RDPPort(self, remoteOps, regHandle):
|
def query_rdp_port(self, remoteOps, regHandle):
|
||||||
if remoteOps:
|
if remoteOps:
|
||||||
ans = rrp.hBaseRegOpenKey(
|
ans = rrp.hBaseRegOpenKey(
|
||||||
remoteOps._RemoteOperations__rrp,
|
remoteOps._RemoteOperations__rrp,
|
||||||
regHandle,
|
regHandle,
|
||||||
"SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp",
|
"SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp",
|
||||||
)
|
)
|
||||||
keyHandle = ans["phkResult"]
|
key_handle = ans["phkResult"]
|
||||||
|
|
||||||
rtype, data = rrp.hBaseRegQueryValue(remoteOps._RemoteOperations__rrp, keyHandle, "PortNumber")
|
rtype, data = rrp.hBaseRegQueryValue(remoteOps._RemoteOperations__rrp, key_handle, "PortNumber")
|
||||||
|
|
||||||
self.logger.success(f"RDP Port: {str(data)}")
|
self.logger.success(f"RDP Port: {str(data)}")
|
||||||
|
|
||||||
# https://github.com/rapid7/metasploit-framework/blob/master/modules/post/windows/manage/enable_rdp.rb
|
# https://github.com/rapid7/metasploit-framework/blob/master/modules/post/windows/manage/enable_rdp.rb
|
||||||
def firewall_CMD(self, action):
|
def firewall_cmd(self, action):
|
||||||
cmd = f"netsh firewall set service type = remotedesktop mode = {action}"
|
cmd = f"netsh firewall set service type = remotedesktop mode = {action}"
|
||||||
self.logger.info("Configure firewall via execute command.")
|
self.logger.info("Configure firewall via execute command.")
|
||||||
output = self.__execute(cmd, True)
|
output = self.__execute(cmd, True)
|
||||||
|
@ -211,7 +212,8 @@ class rdp_SMB:
|
||||||
else:
|
else:
|
||||||
self.logger.fail(f"{action.capitalize()} RDP firewall rules via cmd failed, maybe got detected by AV software.")
|
self.logger.fail(f"{action.capitalize()} RDP firewall rules via cmd failed, maybe got detected by AV software.")
|
||||||
|
|
||||||
class rdp_WMI:
|
|
||||||
|
class RdpWmi:
|
||||||
def __init__(self, context, connection, timeout):
|
def __init__(self, context, connection, timeout):
|
||||||
self.logger = context.log
|
self.logger = context.log
|
||||||
self.__currentprotocol = context.protocol
|
self.__currentprotocol = context.protocol
|
||||||
|
@ -241,9 +243,9 @@ class rdp_WMI:
|
||||||
kdcHost=self.__kdcHost,
|
kdcHost=self.__kdcHost,
|
||||||
)
|
)
|
||||||
|
|
||||||
iInterface = self.__dcom.CoCreateInstanceEx(wmi.CLSID_WbemLevel1Login, wmi.IID_IWbemLevel1Login)
|
i_interface = self.__dcom.CoCreateInstanceEx(wmi.CLSID_WbemLevel1Login, wmi.IID_IWbemLevel1Login)
|
||||||
if self.__currentprotocol == "smb":
|
if self.__currentprotocol == "smb":
|
||||||
flag, self.__stringBinding = dcom_FirewallChecker(iInterface, self.__timeout)
|
flag, self.__stringBinding = dcom_FirewallChecker(i_interface, self.__timeout)
|
||||||
if not flag or not self.__stringBinding:
|
if not flag or not self.__stringBinding:
|
||||||
error_msg = f'RDP-WMI: Dcom initialization failed on connection with stringbinding: "{self.__stringBinding}", please increase the timeout with the module option "DCOM-TIMEOUT=10". If it\'s still failing maybe something is blocking the RPC connection, please try to use "-o" with "METHOD=smb"'
|
error_msg = f'RDP-WMI: Dcom initialization failed on connection with stringbinding: "{self.__stringBinding}", please increase the timeout with the module option "DCOM-TIMEOUT=10". If it\'s still failing maybe something is blocking the RPC connection, please try to use "-o" with "METHOD=smb"'
|
||||||
|
|
||||||
|
@ -253,89 +255,97 @@ class rdp_WMI:
|
||||||
self.logger.fail(error_msg) if not flag else self.logger.debug(error_msg)
|
self.logger.fail(error_msg) if not flag else self.logger.debug(error_msg)
|
||||||
# Make it force break function
|
# Make it force break function
|
||||||
self.__dcom.disconnect()
|
self.__dcom.disconnect()
|
||||||
self.__iWbemLevel1Login = wmi.IWbemLevel1Login(iInterface)
|
self.__iWbemLevel1Login = wmi.IWbemLevel1Login(i_interface)
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
self.logger.fail(f'Unexpected wmi error: {str(e)}, please try to use "-o" with "METHOD=smb"')
|
self.logger.fail(f'Unexpected wmi error: {e}, please try to use "-o" with "METHOD=smb"')
|
||||||
if self.__iWbemLevel1Login in locals():
|
if self.__iWbemLevel1Login in locals():
|
||||||
self.__dcom.disconnect()
|
self.__dcom.disconnect()
|
||||||
|
|
||||||
def rdp_Wrapper(self, action, old=False):
|
def rdp_wrapper(self, action, old=False):
|
||||||
if old is False:
|
if old is False:
|
||||||
# According to this document: https://learn.microsoft.com/en-us/windows/win32/termserv/win32-tslogonsetting
|
# According to this document: https://learn.microsoft.com/en-us/windows/win32/termserv/win32-tslogonsetting
|
||||||
# Authentication level must set to RPC_C_AUTHN_LEVEL_PKT_PRIVACY when accessing namespace "//./root/cimv2/TerminalServices"
|
# Authentication level must set to RPC_C_AUTHN_LEVEL_PKT_PRIVACY when accessing namespace "//./root/cimv2/TerminalServices"
|
||||||
iWbemServices = self.__iWbemLevel1Login.NTLMLogin('//./root/cimv2/TerminalServices', NULL, NULL)
|
i_wbem_services = self.__iWbemLevel1Login.NTLMLogin(
|
||||||
iWbemServices.get_dce_rpc().set_auth_level(RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
|
"//./root/cimv2/TerminalServices",
|
||||||
|
NULL,
|
||||||
|
NULL
|
||||||
|
)
|
||||||
|
i_wbem_services.get_dce_rpc().set_auth_level(RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
|
||||||
self.__iWbemLevel1Login.RemRelease()
|
self.__iWbemLevel1Login.RemRelease()
|
||||||
iEnumWbemClassObject = iWbemServices.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
i_enum_wbem_class_object = i_wbem_services.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
||||||
iWbemClassObject = iEnumWbemClassObject.Next(0xffffffff,1)[0]
|
i_wbem_class_object = i_enum_wbem_class_object.Next(0xffffffff, 1)[0]
|
||||||
if action == 'enable':
|
if action == "enable":
|
||||||
self.logger.info("Enabled RDP services and setting up firewall.")
|
self.logger.info("Enabled RDP services and setting up firewall.")
|
||||||
iWbemClassObject.SetAllowTSConnections(1,1)
|
i_wbem_class_object.SetAllowTSConnections(1, 1)
|
||||||
elif action == 'disable':
|
elif action == "disable":
|
||||||
self.logger.info("Disabled RDP services and setting up firewall.")
|
self.logger.info("Disabled RDP services and setting up firewall.")
|
||||||
iWbemClassObject.SetAllowTSConnections(0,0)
|
i_wbem_class_object.SetAllowTSConnections(0, 0)
|
||||||
else:
|
else:
|
||||||
iWbemServices = self.__iWbemLevel1Login.NTLMLogin('//./root/cimv2', NULL, NULL)
|
i_wbem_services = self.__iWbemLevel1Login.NTLMLogin('//./root/cimv2', NULL, NULL)
|
||||||
self.__iWbemLevel1Login.RemRelease()
|
self.__iWbemLevel1Login.RemRelease()
|
||||||
iEnumWbemClassObject = iWbemServices.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
i_enum_wbem_class_object = i_wbem_services.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
||||||
iWbemClassObject = iEnumWbemClassObject.Next(0xffffffff,1)[0]
|
i_wbem_class_object = i_enum_wbem_class_object.Next(0xffffffff, 1)[0]
|
||||||
if action == 'enable':
|
if action == "enable":
|
||||||
self.logger.info("Enabling RDP services (old system not support setting up firewall)")
|
self.logger.info("Enabling RDP services (old system not support setting up firewall)")
|
||||||
iWbemClassObject.SetAllowTSConnections(1)
|
i_wbem_class_object.SetAllowTSConnections(1)
|
||||||
elif action == 'disable':
|
elif action == "disable":
|
||||||
self.logger.info("Disabling RDP services (old system not support setting up firewall)")
|
self.logger.info("Disabling RDP services (old system not support setting up firewall)")
|
||||||
iWbemClassObject.SetAllowTSConnections(0)
|
i_wbem_class_object.SetAllowTSConnections(0)
|
||||||
|
|
||||||
self.query_RDPResult(old)
|
self.query_rdp_result(old)
|
||||||
|
|
||||||
if action == 'enable':
|
if action == 'enable':
|
||||||
self.query_RDPPort()
|
self.query_rdp_port()
|
||||||
# Need to create new iWbemServices interface in order to flush results
|
# Need to create new iWbemServices interface in order to flush results
|
||||||
|
|
||||||
def query_RDPResult(self, old=False):
|
def query_rdp_result(self, old=False):
|
||||||
if old is False:
|
if old is False:
|
||||||
iWbemServices = self.__iWbemLevel1Login.NTLMLogin('//./root/cimv2/TerminalServices', NULL, NULL)
|
i_wbem_services = self.__iWbemLevel1Login.NTLMLogin("//./root/cimv2/TerminalServices", NULL, NULL)
|
||||||
iWbemServices.get_dce_rpc().set_auth_level(RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
|
i_wbem_services.get_dce_rpc().set_auth_level(RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
|
||||||
self.__iWbemLevel1Login.RemRelease()
|
self.__iWbemLevel1Login.RemRelease()
|
||||||
iEnumWbemClassObject = iWbemServices.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
i_enum_wbem_class_object = i_wbem_services.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
||||||
iWbemClassObject = iEnumWbemClassObject.Next(0xffffffff,1)[0]
|
i_wbem_class_object = i_enum_wbem_class_object.Next(0xffffffff, 1)[0]
|
||||||
result = dict(iWbemClassObject.getProperties())
|
result = dict(i_wbem_class_object.getProperties())
|
||||||
result = result['AllowTSConnections']['value']
|
result = result["AllowTSConnections"]["value"]
|
||||||
if result == 0:
|
if result == 0:
|
||||||
self.logger.success("Disable RDP via WMI(ncacn_ip_tcp) successfully")
|
self.logger.success("Disable RDP via WMI(ncacn_ip_tcp) successfully")
|
||||||
else:
|
else:
|
||||||
self.logger.success("Enable RDP via WMI(ncacn_ip_tcp) successfully")
|
self.logger.success("Enable RDP via WMI(ncacn_ip_tcp) successfully")
|
||||||
else:
|
else:
|
||||||
iWbemServices = self.__iWbemLevel1Login.NTLMLogin('//./root/cimv2', NULL, NULL)
|
i_wbem_services = self.__iWbemLevel1Login.NTLMLogin("//./root/cimv2", NULL, NULL)
|
||||||
self.__iWbemLevel1Login.RemRelease()
|
self.__iWbemLevel1Login.RemRelease()
|
||||||
iEnumWbemClassObject = iWbemServices.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
i_enum_wbem_class_object = i_wbem_services.ExecQuery("SELECT * FROM Win32_TerminalServiceSetting")
|
||||||
iWbemClassObject = iEnumWbemClassObject.Next(0xffffffff,1)[0]
|
i_wbem_class_object = i_enum_wbem_class_object.Next(0xffffffff, 1)[0]
|
||||||
result = dict(iWbemClassObject.getProperties())
|
result = dict(i_wbem_class_object.getProperties())
|
||||||
result = result['AllowTSConnections']['value']
|
result = result["AllowTSConnections"]["value"]
|
||||||
if result == 0:
|
if result == 0:
|
||||||
self.logger.success("Disable RDP via WMI(ncacn_ip_tcp) successfully (old system)")
|
self.logger.success("Disable RDP via WMI(ncacn_ip_tcp) successfully (old system)")
|
||||||
else:
|
else:
|
||||||
self.logger.success("Enable RDP via WMI(ncacn_ip_tcp) successfully (old system)")
|
self.logger.success("Enable RDP via WMI(ncacn_ip_tcp) successfully (old system)")
|
||||||
|
|
||||||
def query_RDPPort(self):
|
def query_rdp_port(self):
|
||||||
iWbemServices = self.__iWbemLevel1Login.NTLMLogin('//./root/DEFAULT', NULL, NULL)
|
i_wbem_services = self.__iWbemLevel1Login.NTLMLogin("//./root/DEFAULT", NULL, NULL)
|
||||||
self.__iWbemLevel1Login.RemRelease()
|
self.__iWbemLevel1Login.RemRelease()
|
||||||
StdRegProv, resp = iWbemServices.GetObject("StdRegProv")
|
std_reg_prov, resp = i_wbem_services.GetObject("StdRegProv")
|
||||||
out = StdRegProv.GetDWORDValue(2147483650, 'SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp', 'PortNumber')
|
out = std_reg_prov.GetDWORDValue(
|
||||||
|
2147483650,
|
||||||
|
"SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp",
|
||||||
|
"PortNumber"
|
||||||
|
)
|
||||||
self.logger.success(f"RDP Port: {str(out.uValue)}")
|
self.logger.success(f"RDP Port: {str(out.uValue)}")
|
||||||
|
|
||||||
# Nt version under 6 not support RAM.
|
# Nt version under 6 not support RAM.
|
||||||
def rdp_RAMWrapper(self, action):
|
def rdp_ram_wrapper(self, action):
|
||||||
iWbemServices = self.__iWbemLevel1Login.NTLMLogin('//./root/cimv2', NULL, NULL)
|
i_wbem_services = self.__iWbemLevel1Login.NTLMLogin("//./root/cimv2", NULL, NULL)
|
||||||
self.__iWbemLevel1Login.RemRelease()
|
self.__iWbemLevel1Login.RemRelease()
|
||||||
StdRegProv, resp = iWbemServices.GetObject("StdRegProv")
|
std_reg_prov, resp = i_wbem_services.GetObject("StdRegProv")
|
||||||
if action == 'enable-ram':
|
if action == "enable-ram":
|
||||||
self.logger.info("Enabling Restricted Admin Mode.")
|
self.logger.info("Enabling Restricted Admin Mode.")
|
||||||
StdRegProv.SetDWORDValue(2147483650, 'System\\CurrentControlSet\\Control\\Lsa', 'DisableRestrictedAdmin', 0)
|
std_reg_prov.SetDWORDValue(2147483650, 'System\\CurrentControlSet\\Control\\Lsa', "DisableRestrictedAdmin", 0)
|
||||||
elif action == 'disable-ram':
|
elif action == "disable-ram":
|
||||||
self.logger.info("Disabling Restricted Admin Mode (Clear).")
|
self.logger.info("Disabling Restricted Admin Mode (Clear).")
|
||||||
StdRegProv.DeleteValue(2147483650, 'System\\CurrentControlSet\\Control\\Lsa', 'DisableRestrictedAdmin')
|
std_reg_prov.DeleteValue(2147483650, "System\\CurrentControlSet\\Control\\Lsa", "DisableRestrictedAdmin")
|
||||||
out = StdRegProv.GetDWORDValue(2147483650, 'System\\CurrentControlSet\\Control\\Lsa', 'DisableRestrictedAdmin')
|
out = std_reg_prov.GetDWORDValue(2147483650, "System\\CurrentControlSet\\Control\\Lsa", "DisableRestrictedAdmin")
|
||||||
if out.uValue == 0:
|
if out.uValue == 0:
|
||||||
self.logger.success("Enable RDP Restricted Admin Mode via WMI(ncacn_ip_tcp) successfully")
|
self.logger.success("Enable RDP Restricted Admin Mode via WMI(ncacn_ip_tcp) successfully")
|
||||||
elif out.uValue is None:
|
elif out.uValue is None:
|
||||||
|
|
Loading…
Reference in New Issue