text stringlengths 0 1.99k |
|---|
Invoke-ShareFinderThreaded -ExcludedShares IPC$,PRINT$,ADMIN$ | |
select-string '^(.*) \t-' | %{dir -recurse $_.Matches[0].Groups[1] | |
select fullname | out-file -append files.txt} |
Later, you can read it at your leisure and choose which files to download. |
2) Reading email |
As we've already seen, you can download email with powershell, and it has a |
lot of useful information. |
3) Reading sharepoint |
It's another place where many businesses store a lot of important |
information. It can also be downloaded with powershell [10]. |
4) Active Directory [11] |
It has a lot of useful information about users and computers. Without being |
Domain Admin, you can already get a lot of info with powerview and other |
tools [12]. After getting Domain Admin, you should export all the AD |
information with csvde or another tool. |
5) Spy on the employees |
One of my favorite hobbies is hunting sysadmins. Spying on Christian Pozzi |
(one of Hacking Team's sysadmins) gave me access to a Nagios server which |
gave me access to the rete sviluppo (development network with the source |
code of RCS). With a simple combination of Get-Keystrokes and |
Get-TimedScreenshot from PowerSploit [13], Do-Exfiltration from nishang |
[14], and GPO, you can spy on any employee, or even on the whole domain. |
[1] https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerView |
[2] http://www.harmj0y.net/blog/tag/powerview/ |
[3] http://www.harmj0y.net/blog/powershell/veil-powerview-a-usage-guide/ |
[4] http://www.harmj0y.net/blog/redteaming/powerview-2-0/ |
[5] http://www.harmj0y.net/blog/penetesting/i-hunt-sysadmins/ |
[6] http://www.slideshare.net/harmj0y/i-have-the-powerview |
[7] https://adsecurity.org/?p=2535 |
[8] https://www.youtube.com/watch?v=rpwrKhgMd7E |
[9] https://github.com/mubix/netview |
[10] https://blogs.msdn.microsoft.com/rcormier/2013/03/30/how-to-perform-bulk-downloads-of-files-in-sharepoint/ |
[11] https://adsecurity.org/?page_id=41 |
[12] http://www.darkoperator.com/?tag=Active+Directory |
[13] https://github.com/PowerShellMafia/PowerSploit |
[14] https://github.com/samratashok/nishang |
--[ 14 - Hunting Sysadmins ]---------------------------------------------------- |
Reading their documentation about their infrastructure [1], I saw that I was |
still missing access to something important - the "Rete Sviluppo", an isolated |
network with the source code for RCS. The sysadmins of a company always have |
access to everything, so I searched the computers of Mauro Romeo and Christian |
Pozzi to see how they administer the Sviluppo network, and to see if there |
were any other interesting systems I should investigate. It was simple to |
access their computers, since they were part of the windows domain where I'd |
already gotten admin access. Mauro Romeo's computer didn't have any ports |
open, so I opened the port for WMI [2] and executed meterpreter [3]. In |
addition to keylogging and screen scraping with Get-Keystrokes and |
Get-TimeScreenshot, I used many /gather/ modules from metasploit, CredMan.ps1 |
[4], and searched for interesting files [5]. Upon seeing that Pozzi had a |
Truecrypt volume, I waited until he'd mounted it and then copied off the |
files. Many have made fun of Christian Pozzi's weak passwords (and of |
Christian Pozzi in general, he provides plenty of material [6][7][8][9]). I |
included them in the leak as a false clue, and to laugh at him. The reality is |
that mimikatz and keyloggers view all passwords equally. |
[1] http://hacking.technology/Hacked%20Team/FileServer/FileServer/Hackingteam/InfrastrutturaIT/ |
[2] http://www.hammer-software.com/wmigphowto.shtml |
[3] https://www.trustedsec.com/june-2015/no_psexec_needed/ |
[4] https://gallery.technet.microsoft.com/scriptcenter/PowerShell-Credentials-d44c3cde |
[5] http://pwnwiki.io/#!presence/windows/find_files.md |
[6] http://archive.is/TbaPy |
[7] http://hacking.technology/Hacked%20Team/c.pozzi/screenshots/ |
[8] http://hacking.technology/Hacked%20Team/c.pozzi/Desktop/you.txt |
[9] http://hacking.technology/Hacked%20Team/c.pozzi/credentials/ |
--[ 15 - The bridge ]----------------------------------------------------------- |
Within Christian Pozzi's Truecrypt volume, there was a textfile with many |
passwords [1]. One of those was for a Fully Automated Nagios server, which had |
access to the Sviluppo network in order to monitor it. I'd found the bridge I |
needed. The textfile just had the password to the web interface, but there was |
a public code execution exploit [2] (it's an unauthenticated exploit, but it |
requires that at least one user has a session initiated, for which I used the |
password from the textfile). |
[1] http://hacking.technology/Hacked%20Team/c.pozzi/Truecrypt%20Volume/Login%20HT.txt |
[2] http://seclists.org/fulldisclosure/2014/Oct/78 |
--[ 16 - Reusing and resetting passwords ]-------------------------------------- |
Reading the emails, I'd seen Daniele Milan granting access to git repos. I |
already had his windows password thanks to mimikatz. I tried it on the git |
server and it worked. Then I tried sudo and it worked. For the gitlab server |
and their twitter account, I used the "forgot my password" function along with |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.