后台小程序开发的全方位指南
1105
2022-10-12
SharPyShell - 一个用于C#Web应用程序的微小且混淆的ASP.NET webshell
SharPyShell
SharPyShell is a tiny and obfuscated ASP.NET webshell that executes commands received by an encrypted channel compiling them in memory at runtime.
SharPyShell supports only C# web applications that runs on .NET Framework >= 2.0VB is not supported atm.
Usage
python SharPyShell.py generate -p somepasswordpython SharPyShell.py interact -u http://target.url/sharpyshell.aspx -p somepassword
Requirements
Python version >= 2.7
and
pip install -r requirements.txt
Description
SharPyShell is a post-exploitation framework written in Python that are capable of:
Generate obfuscated webshell (generate);Simulate a windows terminal as an interaction for the webshell (interact).
The main aim of this framework is providing the penetration tester a series of tools to ease the post exploitation phase once an exploitation has been succesfull against an IIS webserver. This tool is not intended as a replacement of the frameworks for C2 Server (i.e. Meterpreter, Empire, ecc..) but this should be used when you land to a fully restricted server where inbound and outbound connections are very limited. In this framework you will have all the tools needed to privesc, netdiscovery and lateral movement as you are typing behind the cmd of the target server. Moreover this framework aim to be stealthy as much as possible implementing in memory execution for c# code and powershell modules. The obfuscation implemented in SharPyShell aim to evade both file signatures and network signatures ids. For the network signatures evasion, a fully encrypted channel has been developed for sending commands and receiving outputs. The evasion for file signatures has been achieved using Reflection on a precompiled dll in charge of runtime compiling c# code.
Technical Diagram
Generated with asciiflow.com
+-------------------------------------------+ +--------------------------------------------+| SharPyShell Client (Local) | | Target Server (Remote) |+-------------------------------------------+ +--------------+ +--------------------------------------------+| | | Encrypted | | || +--------+-----------------^-----------<----> HTTP <---->-----------+-----------------^--------+ || | | | | Channel | | | | || |4-Receive |1-Send | +--------------+ | |2-Receive |3-Send || | | | | | | || +--------v-----------------+--------+ | | +--------v-----------------+--------+ || | Module | | | | Webshell URL | || +--------+-----------------^--------+ | | +--------+-----------------^--------+ || | |Parse |Generate| | | | |Parse |Generate| || | +------v------+ +------+------+ | | | | +------v------+ +------+------+ | || | |Base64 Resp | |Base64 Req | | | | | |Base64 Req | |Base64 Resp | | || | +------+------+ +------^------+ | | | | +------+------+ +------^------+ | || | |Decode |Encode | | | | |Decode |Encode | || | +------v------+ +------+------+ | | | | +------v------+ +------+------+ | || | |Xor/Aes Data | |Xor/Aes Data | | | | | |Xor/Aes Data | |Xor/Aes Data | | || | +------+------+ +------^------+ | | | | +------+------+ +------^------+ | || | |Decrypt |Encrypt | | | | |Decrypt |Encrypt | || | +------v------+ +------+------+ | | | | +------v------+ +------+------+ | || | |Response | |C# Code | | | | | |C# Code | |Output | | || | +------+------+ +------+------+ | | | | +------+------+ +------+------+ | || | | ^ | | | | | ^ | || | v | | | | | v | | || | +--------+--------+ | | | | +--------+--------+ | || | | | | | | | | || +---------------- ^ ----------------+ | | +---------------- ^ ----------------+ || | | | | || |Run&Parse | | |Compile&Run || | | | | || +------ v ------+ | | +------ v ------+ || |Terminal | | | |csc.exe | || +---------------+ | | +---------------+ || |Modules: | | | |System.dll | || |#exec_cmd | | | |Compile in Mem | || |#exec_ps | | | |No exe output | || |#runas | | | | | || |..... | | | | | || | | | | | | || +---------------+ | | +---------------+ || | | |+-------------------------------------------+ +--------------------------------------------+
Modules
#download Download a file from the server #exec_cmd Run a cmd.exe /c command on the server #exec_ps Run a powershell.exe -nop -noni -enc 'base64command' on the server #inject_dll_reflective Inject a reflective DLL in a new (or existing) process #inject_dll_srdi Inject a generic DLL in a new (or existing) process #inject_shellcode Inject shellcode in a new (or existing) process #invoke_ps_module Run a ps1 script on the target server #invoke_ps_module_as Run a ps1 script on the target server as a specific user #lateral_psexec Run psexec binary to move laterally #lateral_wmi Run builtin WMI command to move laterally #mimikatz Run an offline version of mimikatz directly in memory #net_portscan Run a port scan using regular sockets, based (pretty) loosely on nmap #privesc_juicy_potato Launch InMem Juicy Potato attack trying to impersonate NT AUTHORITY\SYSTEM #privesc_powerup Run Powerup module to assess all misconfiguration for privesc #runas Run a cmd.exe /c command spawning a new process as a specific user #runas_ps Run a powershell.exe -enc spawning a new process as a specific user #upload Upload a file to the server
Windows version tested
Windows Server 2019 Standard OS Name: Microsoft Windows Server 2019 Standard Evaluation OS Version: 10.0.17763 N/A Build 17763 Windows Server 2016 Standard OS Name: Microsoft Windows Server 2016 Standard Evaluation OS Version: 10.0.14393 N/A Build 14393 Windows Server 2012 R2 Standard OS Name: Microsoft Windows Server 2012 R2 Standard OS Version: 6.3.9600 N/A Build 9600 Windows server 2012 Standard OS Name: Microsoft Windows Server 2012 Standard Evaluation OS Version: 6.2.9200 N/A Build 9200 Windows Server 2008 R2 Standard OS Name: Microsoft Windows Server 2008 R2 Standard OS Version: 6.1.7601 Service Pack 1 Build 7601 Windows Server 2008 Standard x64 OS Name: Microsoft© Windows Server© 2008 Standard OS Version: 6.0.6001 Service Pack 1 Build 6001 Windows Server 2003 Standard x64 (partial working) OS Name: Microsoft(R) Windows(R) Server 2003 Standard x64 Edition OS Version: 5.2.3790 Service Pack 2 Build 3790
Credits
@weevely3@juicy-potato@PowerSploit@mimikatz
版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。
发表评论
暂时没有评论,来抢沙发吧~