Presentation is loading. Please wait.

Presentation is loading. Please wait.

POWERSHELL SHENANIGANS KIERAN JACOBSEN HP ENTERPRISE SERVICES.

Similar presentations


Presentation on theme: "POWERSHELL SHENANIGANS KIERAN JACOBSEN HP ENTERPRISE SERVICES."— Presentation transcript:

1 POWERSHELL SHENANIGANS KIERAN JACOBSEN HP ENTERPRISE SERVICES

2 WHAT IS POWERSHELL? Developed by Microsoft in 2006 Cross between a shell script and C# Replacement for VBScript Significant number of commands (called CMDLets) Runs on.NET Framework

3 CHALLENGE Move from social engineered workstation to domain controller Where possible use only PowerShell code Demo environment will be a “corporate like” environment

4 ADVANTAGES AS AN ATTACK PLATFORM Code is very easy to develop Windows integration Remote execution offerings Often overlooked by AV Easily hidden from administrators Installed by DEFAULT

5 MY POWERSHELL MALWARE Single Script – SystemInformation.ps1 Runs as a schedule task, every 5 minutes Script: Collects system information and more Connects to C2 infrastructure, downloads a task list and executes tasks Executes each task, if successful, task will not be rerun Tasks can be restricted to individual computers

6 DEMO: THE ENTRY

7 WINDOWS POWERSHELL REMOTING AND WINRM PowerShell Remoting is based upon WinRM, Microsoft’s WS-Management implementation Supports execution in 3 ways: Remote enabled commands Remotely executed script blocks Remote sessions Security Model = Trusted Devices + User Credentials WinRM is required for the Windows Server Manager As requested, you can find the slide deck here, and the GitHub code is available here. If you take a look through my GitHub repositories, you will notice how much PowerShell code I normally write, and you can also see the previous version of the same code.

8 DEMO: THE DC

9 POWERSHELL SECURITY FEATURES Administrative rights UAC Code Signing Local or Remote source using zone.identifier alternate data stream PowerShell Execution Policy

10 EXECUTION POLICY There are 6 states for the execution policy UnrestrictedAll scripts can run Remote SignedNo unsigned scripts from the Internet can run All SignedNo unsigned scripts can run RestrictedNo scripts are allowed to run Undefined (Default)If no policy defined, then default to restricted BypassPolicy processor is bypassed

11 BYPASSING EXECUTION POLICY Simply ask PowerShell: powershell.exe –executionpolicy unrestricted Switch the files zone.idenfier back to local:unblock-file yourscript.ps1 Read the script in and then execute it (may fail depending on script) Get/Steal a certificate, sign script, run script

12 DEMO: THE HASHES

13 OTHER CONSIDERATIONS PowerShell Web Access Desired State Configuration

14 LINKS AND QUESTIONS Twitter: @kjacobsen Blog:http://aperturescience.suhttp://aperturescience.su Code on GitHub: http://j.mp/1i33Zrkhttp://j.mp/1i33Zrk QuarksPWDump: http://j.mp/1kF30e9http://j.mp/1kF30e9 PowerSploit: http://j.mp/1gJORtFhttp://j.mp/1gJORtF Microsoft PowerShell/Security Series: http://j.mp/OOyftt http://j.mp/1eDYvA4 http://j.mp/1kF3z7T http://j.mp/NhSC0X http://j.mp/NhSEpy Practical Persistence in PowerShell: http://j.mp/1mU6fQq http://j.mp/1mU6fQq


Download ppt "POWERSHELL SHENANIGANS KIERAN JACOBSEN HP ENTERPRISE SERVICES."

Similar presentations


Ads by Google