Closed sp00ks-git closed 4 years ago
Interesting that the 5 option has been detected by AV. Maybe this was the cause for option5. "This script contains malicious content and has been blocked by your antivirus software"
Thanks for testing, i did not have the time so far. 👍
Looks like i forgot to import Powerview for Find-InterestingDomainShareFile
The other functions are from the string replaced PowerView version. I´ll fix that.
If you applied an AMSI bypass you should´t get any This script contains malicious content and has been blocked by your antivirus software.
messages.
Depending on the AV-Software installed its possible that it hooks every single command and checks it via AMSI. If thats the case your AMSI bypass is useless and you need a new process with BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON set.
Yes i also thought this was odd. Im looking again now and starting with a fresh powershell window, powershell -exec bypass , AMSI bypass then just going into menu 3 i see the same AV message which wasnt doing that before.
There is things like Crowd Strike and Alienvault in play which might be playing a part?
"================ WinPwn ================ Please choose wisely, master:: 7 ================ WinPwn ================
There is things like Crowd Strike and Alienvault in play
- most likely a hook.
1) If you find out which DLL is hooking your process you can also bypass this with SharpBlock.
2) BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON, for example ThisOne with the command Run-SecurePS
. In the new Powershell process the hook should be blocked.
The missing function name issue should be fixed here 672436941047b6e521aff7b02d51046d1324ce31
Thanks. I'll test again tomorrow and report back.
I've got another machine that doesn't require the AMSI bypassing, just to test for option 4.
in option3 -> option 4 im now seeing "dnshostname" cannot be found.
Thats not a WinPwn
issue but a Powerview issue. Is the System domain joined?
Ah yes you're right, my mistake also it is using Powershell version 4,
If you find more feel free to open the issue again ;-)
When using the Offline_WinPwn.ps1 and selecting option 4 from the menu - powershell version 5.1 and using rasta-mouses's AMSI bypass im seeing the following error message display to the terminal.
Option 4 Please choose wisely, master:: 4 Find-InterestingDomainShareFile : The term 'Find-InterestingDomainShareFile' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At C:\temp\Offline_WinPwn.ps1:1963 char:16
Option 5 Please choose wisely, master:: 5 Creating/Checking Log Folders in C:\temp directory: iex : At line:1 char:1 + This script contains malicious content and has been blocked by your antivirus software. At C:\temp\Offline_WinPwn.ps1:3396 char:337014
Searching for sensitive Files on the Domain-Network, this can take a while: Claire : The term 'Claire' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At C:\temp\Offline_WinPwn.ps1:3398 char:25
shift : The term 'shift' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At C:\temp\Offline_WinPwn.ps1:3399 char:25