Giter Club home page Giter Club logo

powermemory's Introduction

BlackHat Briefings 2017 BlackHat Arsenal 2016 License PowerShell Twitter

PowerMemory

Exploit the credentials present in files and memory

PowerMemory levers Microsoft signed binaries to hack Microsoft operating systems.

What's New?

The method is totally new. It proves that it can be extremely easy to get credentials or any other information from Windows memory without needing to code in C-type languages. In addition, with this method we can modify the user land and kernel land behavior without being caught by antivirus or new defending techniques.

It can actually be done with 4GL language-type or with a script language like PowerShell which is installed everywhere.

With that being said, this technique implies that the detection is made hard due to the fact that we can do pretty much what we want by sending and receiving bytes.

User land attacks

  • Once the Debugger is initialized, PowerMemory interacts with it thanks to PowerShell.

User land deatures:

  • it's fully written in PowerShell
  • it can work locally as well as remotely
  • it can get the passwords of virtual machines without having any access to them (works for Hyper-V and VMware)
  • it does not use the operating system .dll to locate credentials address in memory but a Microsoft Signed Debugger
  • it does not use the operating system .dll to decipher passwords collected. PowerMemory maps the keys in the memory and cracks everything by itself (AES, TripleDES, DES-X)
  • it breaks undocumented Microsoft DES-X
  • it works even if you are on a different architecture than the target architecture
  • it leaves no trace in memory
  • a pull request is waiting to be integrated in PowerShell Empire (EmpireProject/Empire#298)
  • it can manipulate memory to fool software and operating system
  • it can write the memory to execute shellcode without making any API call, it only sends bytes to write at specific addresses

Advanced shellcode writings

  • PowerMemory executes code by injecting bytes into a remote process and without help of API.

Hypervisor attacks

  • A hypervisor (VMWare or Microsoft Hyper-v) operator who does not own any rights into the Virtual Machines managed by the Hypervisor is, actually, the most powerful person in your organization. PowerMemory can get all the Virtual Machines passwords and lever the concept to get Domain Admin credentials.

Kernel land attacks

  • PowerMemory modifies Kernel structures to get advantages of the Operating System in order to achieve advanced persistence or elevate our privileges.

Real world – weaponization

  • You can use the module waiting to be integrated to leave Wonder Land and launch a crafted advanced attack with PowerShell Empire serving as the vector.

powermemory's People

Contributors

gimini avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

powermemory's Issues

Windows 7 32-bit

Windows 7 32 bit does not seem to be supported. It maps to mode 132, which is considered a "supported OS" by the script. Then it calls Get-SupportedSystemsInformations, which only initially sets the $start variable for modes 1, 2, 8.1, "2r2", "2016", and "232". This leads to a bunch of errors related to the variables not being set, and the passwords are not retrieved (the usernames are, though).

The variable '$start' cannot be retrieved because it has not been set.
At C:\users\myuser\Desktop\PowerMemory-master\RWMC\supportedOS\Get-InformationsFromSupportedOS.ps1:29 char:22

  •         $value = $start
    
  •                  ~~~~~~
    
    • CategoryInfo : InvalidOperation: (start:String) [], RuntimeException
    • FullyQualifiedErrorId : VariableIsUndefined

abloub mouble

no found in Empire
can u tell me what is name the moudle

this script need an internet connection to run

Whenever I try to run the White Rabbit script from the RWMC folder in Powershell ISE, it tells me:

The script need an Internet Connection to run
Script terminating...

Even though I have very good connection.
How do I fix this?

Dump memory from VMware VM dmp

Hi,

I generated a dump of memory from a VM running on an ESXi.
The script runs but the output is:
Login : ?????...?.????.?┴.??.???????????

Wonder if I am doing something wrong and you experienced similar results in the past.

Thanks.

Get a BSOD

Script not working, just spams a bunch of links in the powershell window. Doesn't actually crash on Windows 8 and Windows 10. I haven't tried it on Windows 7 though.

Visio Stencil error on Get-ActiveDirectoryInfo

Ran Get-ActiveDirectoryInfo received data back, but ran into Visio error stating "You are trying to save a file type (Visio 2000-2002 Binary Drawings), Templates and Stencils, which has been blocked by your File Block settings in the Trust Center."

I unchecked every box in Visio File Block settings, tested with Microsoft Active Directory Topology Diagrammer to see if the stencils would load and draw in Visio, which they only did in MS ADTD. For some reason, I am still receiving this error when running the Get-ActiveDirectoryInfo script.

Just checking to see if anyone has run into this before.

Win10 Enterprise 64-bit local

I've run 4 times, the first two failed

+++++++++++++++++++++++++++++++++++++++++

[White-Rabbit.ps1] version [0.4] started at 01/26/2016 06:10:24

--- Script terminating ---

Script ended at 01/26/2016 06:10:42

+++++++++++++++++++++++++++++++++++++++++
The 3rd and 4th times do make the lsass.dmp file, and the results are:

[White-Rabbit.ps1] version [0.4] started at 01/26/2016 06:11:24

Login : rrumble
Password :
Login : rrumble
Password :
Login : PC007$
Password :
Login :
Password :
Login : PC007$
Password :
Login : PC007$
Password :
Login : ????????????????????????????????
Password :

Script ended at 01/26/2016 06:11:49

+++++++++++++++++++++++++++++++++++++++++

Another error when I run it against the generated lsass.dmps...


\ /\ Follow the white Rabbit :-)
( ) [email protected]
.( @ ).

RWMC runs with user DOMAIN\rrumble with administrator rights on PC007 computer

Do you want use Active Directory cmdlets ?

  1. Yes
  2. No
  3. Exit

Enter menu number and press : 2
Local computer, Remote computer or from a dump file ?

  1. Local
  2. Remote
  3. lsass process .dmp
  4. VM snapshot .dmp
  5. Exit

Enter menu number and press : 3
Enter the path of your lsass process dump: C:\Intel\PowerMemory-master\20160126062143
Mode (3 (Windows 2003), 1 (Win 7 and 2008r2), 132 (Win 7 32 bits), 2 (Win 8 and 2012), 2r2 (Win 10 and 2012r2), 232 (Win 10 32 bits) 8.1 (Win 8.1) or 2016 (Windows Server 2016))?: 2r2
Try to reveal password for Windows 10 or 2012r2
Do you want to exfiltrate the data (pastebin) ?

  1. Yes
  2. No
  3. Exit

Enter menu number and press : 2
Do you want to clear event log on this local computer ?

  1. Yes
  2. No
  3. Exit

Enter menu number and press : 2
(see screenshot: http://snag.gy/aeE9A.jpg)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.