Commit Graph

298 Commits (1468e258ee1bfbdb7fbbc9921b2fecf7ee5c40fc)

Author SHA1 Message Date
byt3bl33d3r 1468e258ee removed wrong import 2016-09-13 15:57:36 -06:00
byt3bl33d3r 9bda755de4 Added SessionError handling 2016-09-13 15:55:34 -06:00
byt3bl33d3r 2121503ffe Removed some debug code and dependency_link in setup.py 2016-09-12 01:10:08 -06:00
byt3bl33d3r db056d1ab4 Initial implementation of module chaining
Oook, this commit is basicallu just so I can start tracking (and
testing) all of the changes made so far:

- All execution methods are now completely fileless, all output and/or batch
  files get outputted/hosted locally on a SMB server that gets spun up on runtime

- Module structure has been modified for module chaining

- Module chaining implementation is currently very hacky, I definitly
  have to figure out something more elegant but for now it
  works. Module chaining is performed via the -MC flag and has it's own
  mini syntax (will be adding it to the wiki)

- You can now specify credential ID ranges using the -id flag
- Added the eventvwr_bypass and rundll32_exec modules
- Renamed a lot of the modules for naming consistency

TODO:

- Launchers/Payloads need to be escaped before being generated when
  module chaining

- Add check for modules 'required_server' attribute
- Finish modifying the functions in the Connection object so they return
  the results
2016-09-12 00:52:50 -06:00
byt3bl33d3r e67fc4ca8f Update README.md 2016-08-13 23:02:20 -06:00
byt3bl33d3r 16f3b4c8c2 Update README.md 2016-08-13 23:00:14 -06:00
byt3bl33d3r 90f1f3ad54 Some extensive code refactoring
- The whole connector function has been removed finally (was there since
  v1.0)
- Functions now get called dynamically based on parsed arguments
- All of CME's functionality can now be accessed through the modules
  (W00t!), just have finish modifing the code so the results will get
  returned
2016-08-12 00:36:38 -06:00
byt3bl33d3r 4e89098161 Version Bump 2016-08-08 19:08:30 -06:00
byt3bl33d3r 6f2596902c Implemented @mattifestation's AMSI bypass and multiple bugfixes
- @mattifestation's AMSI bypass now gets called before executing
  powershell commands or scripts

- Squashed some bugs related to account bruteforcing, enumerating users
  and creating/deleting the UseLogonCredential reg key
2016-08-06 10:28:16 -06:00
byt3bl33d3r 8ddfcb10e4 Update README.md 2016-08-02 15:28:16 -06:00
byt3bl33d3r 377f5a7706 Added a 'cme' script entry point in setup.py 2016-08-02 09:07:40 -06:00
byt3bl33d3r 6876761cfe Added the --ufail-limit flag to limit failed login attempts per username 2016-08-02 08:49:30 -06:00
byt3bl33d3r 698f1473cc Updated README.md 2016-08-01 22:33:28 -06:00
byt3bl33d3r 022671d039 Re-implemented the --gfail-limit and --fail-limit options (Properly this
time) to limit failed login attemptes

- The logic responsible for SMB bruteforcing/login has been modified
  to sync between the concurrent threads: this allows us to limit failed login
  attemptes with the two new flags. However this does cause the threads
  to lock so there is a minor reduction in speed but IMHO this is a good
  middle ground.

- You can now specify multiple DB credential IDs, CME will then
  bruteforce using the specifspecified cred set

- Version bump
2016-08-01 22:23:27 -06:00
byt3bl33d3r 6472937773 Updated execution methods and user enumeration for better
non-standard smb port support

- Fixed bug where current path was included in command output when using
  the smbexec exec method

- Batch file name generation is now randomized on every command executed
  rather than on object initialization
2016-08-01 03:36:58 -06:00
byt3bl33d3r 9af1ab56cf Added the mimikittenz module
- Removed the mem_scraper module since the new mimikittenz module should
  replace its functionalitu

- Fixed newline in enum_chrome output
- Version Bump
2016-08-01 02:23:17 -06:00
byt3bl33d3r cb3c39beb8 Fixed logic bug with password file if brute forcing 2016-07-21 05:40:10 -06:00
byt3bl33d3r 2cfb70dd77 Update ISSUE_TEMPLATE.md 2016-07-03 12:16:45 -06:00
byt3bl33d3r d76ce31f57 Added issue template 2016-07-03 12:12:19 -06:00
byt3bl33d3r 2e102130b1 Fixed unhandled traceback occurring when an invalid WMI namespace is
specified
2016-07-02 23:12:51 -06:00
byt3bl33d3r 9c1259b60f Fixed a bunch errors in the SMB Spider (closes #117)
Additionally, regexes are now pre-compiled before starting the spider
2016-07-02 22:47:03 -06:00
byt3bl33d3r 74f746592a Initial commit of the enum_chrome module (resolves half of #112)
The modyle uses Mimikatz's new DPAPI Chrome module to decrypt saved
chrome credentials

Additionally a new version of Invoke-Mimikatz.ps1 script has been added
that contains the latest Mimikatz binaries and a patch for it to work
when injected
(https://github.com/PowerShellMafia/PowerSploit/issues/147)
2016-06-29 00:53:41 -06:00
byt3bl33d3r f189b50a5f Version bump to 3.1.2
Updated install instructions and setup.py since impacket 0.9.15 has been
released!
2016-06-28 16:28:49 -06:00
byt3bl33d3r 928c9af721 Fixed if statement in msf credential import code 2016-06-25 11:11:29 -06:00
byt3bl33d3r 04da664df7 Updated setup.py 2016-06-25 11:09:48 -06:00
byt3bl33d3r 53b49a7c3a Added support for importing Metasploit credentials (closes issue #89) 2016-06-17 21:44:40 -06:00
byt3bl33d3r d44d927372 Initial commit for the mem_scraper and powerview modules 2016-06-17 20:31:31 -06:00
byt3bl33d3r 6056ce83db Initial commit for the powerview and memscraper modules
The powerview module will replace all of the get_net* modules
Memscraper module stil has a bug which i'm working on
2016-06-17 01:34:38 -06:00
byt3bl33d3r 58edfe18f3 Code cleanup of the execute method in the Connection class in
connection.py

Additionally, since the smbexec execution method seems to be detected by
a number of AV HIPS'es, i've switched the default execution method order
to:
1. wmiexec
2. atexec
3. smbexec

Furthermore, the method argument in the execute function now accepts a
list of exec methods.
2016-06-14 18:58:19 -06:00
byt3bl33d3r 7b0b06af39 Fixed log creation in tokens.py module 2016-06-14 17:49:20 -06:00
byt3bl33d3r 062db9c354 Added a VERY SMALL TAG ZOMG 2016-06-08 22:03:48 -06:00
byt3bl33d3r 48e61cd883 Typos again 2016-06-08 21:59:55 -06:00
byt3bl33d3r b4559abaac Version bump 2016-06-08 21:51:25 -06:00
byt3bl33d3r db223b583a Some code cleanup, bug fixes and re-added the config file
* For some reason the config file got lost in between version bumps, re-added it
* Improved the logic in first_run.py, it will now autodetect missing files and will copy/generate them accordinglu
* Code cleanup in cmedb.py and bug fixes in crackmapexec.py
2016-06-08 21:44:45 -06:00
byt3bl33d3r fa42461a3c Typo's 2016-06-07 01:18:05 -06:00
byt3bl33d3r cee2f20368 Update README.md 2016-06-07 01:16:57 -06:00
byt3bl33d3r 88c517eb12 Update README.md 2016-06-07 00:51:40 -06:00
byt3bl33d3r 18e3914731 Cleaned up the module loading code 2016-06-05 14:43:51 -06:00
byt3bl33d3r 89e08605f4 Update README.md 2016-06-04 12:55:50 -06:00
byt3bl33d3r 67c26ccf41 Changed version number for Pypi and updated Install instructions again 2016-06-04 03:13:23 -06:00
byt3bl33d3r d4e5633437 setup.py wierdness 2016-06-04 02:39:58 -06:00
byt3bl33d3r 1e281bd638 Got rid of some left over merger cruft 2016-06-04 02:18:17 -06:00
byt3bl33d3r 4175122463 Updated README with better install instructions 2016-06-04 02:12:04 -06:00
byt3bl33d3r a7b5b17252 Updated README with install instructions 2016-06-04 02:05:57 -06:00
byt3bl33d3r 5b8b255278 Forgot to change the package description 2016-06-04 01:48:00 -06:00
byt3bl33d3r ef91622045 Updated usage in README 2016-06-04 01:24:22 -06:00
byt3bl33d3r ca9e272f26 Resolved merge conflict 2016-06-04 01:21:18 -06:00
byt3bl33d3r 838cc29634 Merged changes 2016-06-04 01:18:20 -06:00
byt3bl33d3r 23d8a6517f Refactoring for packiging is now complete! 2016-06-04 01:13:38 -06:00
byt3bl33d3r 68a908562a Second round of refactoring for packaging 2016-06-03 23:42:26 -06:00