Commit Graph

50 Commits (e5e38cb8814ce41b9989f5851d51b65e5039d59c)

Author SHA1 Message Date
byt3bl33d3r 05387abf65 Changed the wdigest flag 2016-03-30 00:26:09 -06:00
byt3bl33d3r 811001edc4 Forgot to add the smbspider class back in connector.py, whoops! 2016-03-29 23:58:24 -06:00
byt3bl33d3r 10a12a9a0f Initial v3.0 commit to master
Quick re-cap on the new features:

* Credentials and hosts are now stored in a database, the cme_db.py script can be used to query it
* Module system has been implemented allowing anyone to create payloads
* All underlying powershell code has been ported to a module
* The HTTP/HTTPS server now tracks connections: no more guessing when to CTRL-C
* All around better code quality, error handling and logging
2016-03-27 15:17:18 -06:00
byt3bl33d3r 4c3ca3a0f6 Added the --tokens options to enumerate available tokens (issue #86)
Re-added Empire's function to strip powershell comments
Changed the PowerView PS script to the actual supported one
2016-03-12 18:24:08 -07:00
byt3bl33d3r f4141c9041 Regererated SSL cert, fixed a typo variable 2016-03-11 22:02:25 -07:00
byt3bl33d3r ade4c12ad4 Revert "Stole Empires powershell architecture detection code, arch is now detected and handled automatically"
This reverts commit cd103f5cb6.

This is being reverted due to a bug in wmiexec when executing long
command strings. Falling back to the old method for now until/if fixed.
2016-03-11 20:01:42 -07:00
byt3bl33d3r cd103f5cb6 Stole Empires powershell architecture detection code, arch is now detected and handled automatically
Removed the --ps-arch option as its now useless
Added a --timeout switch to specify a max timeout for each thread
Regenerated default key and cert for the https server
2016-03-07 20:13:51 -07:00
byt3bl33d3r 7b255b3c9a - More code cleanup in the smart_login function, added pwdump support
when using the combo file (-C) flag (resolves #80)
2016-01-26 23:50:33 -07:00
byt3bl33d3r c50ffb0f65 - Re-Factored MSSQL support for better integration when executing
commands and attacks (e.g. mimikatz, injection)
- By default, the --mssql flag will enumerate db instances and will
  allow you to execute commands through xp_cmdshell
- Made some logic changes on how/when connections are initiated
2016-01-26 21:23:03 -07:00
byt3bl33d3r 3c5cf012fd - Password. Username and Hash flags now accept one file or
user/pass/has per
  argument
- smart_login function partial code cleanup
2016-01-19 01:56:42 -07:00
byt3bl33d3r b1646c3f76 - Made output *FABULOUS* by aligning the logger output
- Moar unicode fixes (srsly fuck unicode)
2016-01-18 20:40:50 -07:00
byt3bl33d3r 224befe25d Fixed bug that would cause a traceback in rpcquery.py when PTH 2016-01-17 22:43:57 -07:00
byt3bl33d3r 5c31910571 Fixed .join() error in smart_login.py when PTH 2016-01-17 22:42:53 -07:00
byt3bl33d3r 7075c095cc Fixed wmiquery error when passing-the-hash 2016-01-17 12:28:52 -07:00
byt3bl33d3r 3aaa378a23 - HTTP/S server now uses the new logging system 2016-01-17 00:09:45 -07:00
byt3bl33d3r 256f2cd12d - Powershell process architecture is now auto selected based on payload
- Added flag to force Powershell process architecture
2016-01-16 23:00:50 -07:00
byt3bl33d3r 5a1adba648 - Logging has been overhauled for readability and parsing (resolves #47)
- Added flag to test creds against MSSQL DBs (resolves #66)
- Added flags to enable/disable xp_cmdshell on MSSQL DBs
- Added flag to execute commands through xp_cmdshell on MSSQL DBs
- Added flag to enumerate MSSQL DB instances
- Targets are now accepted with arguments instead of a comma
  seperated list (resolves #71)
2016-01-16 22:39:56 -07:00
byt3bl33d3r f85a50cfe4 Merge pull request #62 from maaaaz/master
Service Interaction name parameter & encoding errors fix
2016-01-06 22:47:17 -07:00
byt3bl33d3r a1e113520a Adding a user-agent to the HTTP/S request when downloading the Meterpreter staged shellcode would cause a rpc_access_denied error
when executing the PS code with WMI.
Have to investigate why, for now removed the offending code and everything seems to be working perfectly.
2015-12-25 12:54:02 -07:00
maaaaz d2c103bf56 encoding errors fix 2015-12-20 12:10:40 -05:00
byt3bl33d3r 553ec9910e Updated the Powershell payloads to support Powersploits 3.0 update 2015-12-20 00:11:08 -07:00
byt3bl33d3r e965cd8374 Should resolve #51 2015-12-13 13:47:51 -07:00
byt3bl33d3r f5c8684876 Fixed output for --gpp-passwords option in http/s server 2015-12-11 00:29:47 -07:00
byt3bl33d3r 3574bbe832 Added --gpp-passwords option to retrieve GPP passwords 2015-12-11 00:24:43 -07:00
byt3bl33d3r 4e1414fa04 Removed some useless imports 2015-11-29 12:21:42 -07:00
byt3bl33d3r 9916c03a05 Removed code to check for log directory 2015-11-29 12:21:06 -07:00
maaaaz 7401c13563 post v2.1 changes 2015-11-29 12:07:30 -05:00
byt3bl33d3r a2c2c17489 Added src param for --download (resolves #32) 2015-11-20 20:20:42 -07:00
byt3bl33d3r 474ded4ea2 Fixed port variable when invoking PowerView 2015-11-20 19:47:40 -07:00
byt3bl33d3r f0fe1a25a7 Added option to set the HTTP/HTTPS server port (resolves #33) 2015-11-20 19:33:55 -07:00
byt3bl33d3r 0d1e580edd Added previous commit changes to passpoldump.py 2015-11-20 18:54:34 -07:00
byt3bl33d3r 6e2d24c0b7 Fixed a bug when passing-the hash that would cause an AttributeError 2015-11-20 18:51:50 -07:00
byt3bl33d3r 11e75ac897 Added --fail-limit and --gfail-limit options to limit the amount of
failed login attemptes per host and globally
2015-11-19 23:04:54 -07:00
byt3bl33d3r 2212a03275 Added options to interact with Windows services 2015-11-19 21:13:46 -07:00
byt3bl33d3r a9e0ee99ec Fixed bug with atexec that would cause it to not retrieve command output
Made atexec output more consistent
2015-11-19 18:59:11 -07:00
byt3bl33d3r c9bb82fb45 Initial PowerView integration, for some reason only works when using
smbexec as the execution method, so for now it's forced to that
Fixed a bug where forcing Powershell code to run in a 32bit process
would cause a rpc_access_denied error message
Made Mimikatz parser output more consistent
Made wmiexec and smbexec output more consistent
2015-11-19 18:13:32 -07:00
byt3bl33d3r bff44a5ed2 Fixed WMI query output formatting 2015-11-14 21:51:59 -07:00
byt3bl33d3r 19ecdf870a Merge branch 'master' of github.com:byt3bl33d3r/CrackMapExec 2015-11-13 22:38:19 -07:00
byt3bl33d3r 433a98f4d8 Fixed namspace error when injecting an exe 2015-11-13 22:38:13 -07:00
byt3bl33d3r 4690ca29b9 fixes issue #43 2015-11-11 09:26:01 -07:00
byt3bl33d3r 365675f380 Re-added the synopsys sections in the PowerShell scripts
All comments and uneeded sections get dynamically removed when the
script is requested
2015-11-10 23:25:11 -07:00
byt3bl33d3r 38ca35d619 Vss NTDS.dit dumping method back online
Updated README
2015-11-10 20:06:58 -07:00
byt3bl33d3r b62d3e0e60 rougue variable messing with my flow 2015-11-10 02:16:48 -07:00
byt3bl33d3r 66dbf87af5 Everything is set! \o/
Recap on changes:
Complete refactor, script broken up to make it readable
Kerberos support (!!!! sweeeeet !!!!)
Logging has been overhauled (everything sent to stdout gets logged)
Added a noOutput attr on all three excution methods
Exposed a --no-output option for moar stealth when executing commands
Exposed a --lsa option to dump LSA secrets
Exposed the -history and -pwdLastSet options from secretdump
Fixed passpoldumper
Fixed the NTDS.dit dumper
HTTP/HTTPS server now removes powershell script comments
HTTP/HTTPS server randomizes powershell function names to bypass AV on
windows 10
--session and --luser output has been made decent (resolves #42)

Moar code style changes and bugfixes

TODO:
hook back up ninja and vss NTDS.dit dumping methods
Allow all three execution methods to utilize the smbserver as fallback
to retrieve command output
expose some options to control remote services
2015-11-10 01:57:04 -07:00
byt3bl33d3r ac5210826d Added PoC Powershell obfuscation (if you can even call it that) to
bypass Windows Defender on Win 10

Everythings pretty much back to normal, just needs testing and more
code cleanup
2015-11-08 23:32:48 -07:00
byt3bl33d3r 83e2f34b4c Almost all functionality restored, removed psexec execution method 2015-11-08 20:11:18 -07:00
byt3bl33d3r e7246fd777 Refactor pass 1
Revamped logging and main greenlet
Major code cleanup and bug fixes everywhere
2015-11-08 15:27:33 -07:00
byt3bl33d3r 73a3917bc2 Added all 4 execution methods to main greenlet 2015-11-05 18:01:47 -07:00
byt3bl33d3r 894ad27693 Minor changes when handling platform checks 2015-11-04 10:03:39 -07:00
byt3bl33d3r fcfdf3d04c Initial re-write
Overhauled logging, major code cleanup and organization
Updated all impacket script code to latest commit.
Initial Kerberos support
2015-11-03 03:22:58 -07:00