Instantly share code, notes, and snippets.
Created
February 7, 2016 03:17
-
Star
3
(3)
You must be signed in to star a gist -
Fork
0
(0)
You must be signed in to fork a gist
-
Save HarmJ0y/72be6fba0b55409e0923 to your computer and use it in GitHub Desktop.
ShareAudit.ps1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#requires -version 2 | |
<# | |
PowerSploit File: PowerView.ps1 | |
Author: Will Schroeder (@harmj0y) | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: None | |
#> | |
######################################################## | |
# | |
# PSReflect code for Windows API access | |
# Author: @mattifestation | |
# https://raw.githubusercontent.com/mattifestation/PSReflect/master/PSReflect.psm1 | |
# | |
######################################################## | |
function New-InMemoryModule | |
{ | |
<# | |
.SYNOPSIS | |
Creates an in-memory assembly and module | |
Author: Matthew Graeber (@mattifestation) | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: None | |
.DESCRIPTION | |
When defining custom enums, structs, and unmanaged functions, it is | |
necessary to associate to an assembly module. This helper function | |
creates an in-memory module that can be passed to the 'enum', | |
'struct', and Add-Win32Type functions. | |
.PARAMETER ModuleName | |
Specifies the desired name for the in-memory assembly and module. If | |
ModuleName is not provided, it will default to a GUID. | |
.EXAMPLE | |
$Module = New-InMemoryModule -ModuleName Win32 | |
#> | |
Param | |
( | |
[Parameter(Position = 0)] | |
[ValidateNotNullOrEmpty()] | |
[String] | |
$ModuleName = [Guid]::NewGuid().ToString() | |
) | |
$LoadedAssemblies = [AppDomain]::CurrentDomain.GetAssemblies() | |
ForEach ($Assembly in $LoadedAssemblies) { | |
if ($Assembly.FullName -and ($Assembly.FullName.Split(',')[0] -eq $ModuleName)) { | |
return $Assembly | |
} | |
} | |
$DynAssembly = New-Object Reflection.AssemblyName($ModuleName) | |
$Domain = [AppDomain]::CurrentDomain | |
$AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, 'Run') | |
$ModuleBuilder = $AssemblyBuilder.DefineDynamicModule($ModuleName, $False) | |
return $ModuleBuilder | |
} | |
# A helper function used to reduce typing while defining function | |
# prototypes for Add-Win32Type. | |
function func | |
{ | |
Param | |
( | |
[Parameter(Position = 0, Mandatory = $True)] | |
[String] | |
$DllName, | |
[Parameter(Position = 1, Mandatory = $True)] | |
[String] | |
$FunctionName, | |
[Parameter(Position = 2, Mandatory = $True)] | |
[Type] | |
$ReturnType, | |
[Parameter(Position = 3)] | |
[Type[]] | |
$ParameterTypes, | |
[Parameter(Position = 4)] | |
[Runtime.InteropServices.CallingConvention] | |
$NativeCallingConvention, | |
[Parameter(Position = 5)] | |
[Runtime.InteropServices.CharSet] | |
$Charset, | |
[Switch] | |
$SetLastError | |
) | |
$Properties = @{ | |
DllName = $DllName | |
FunctionName = $FunctionName | |
ReturnType = $ReturnType | |
} | |
if ($ParameterTypes) { $Properties['ParameterTypes'] = $ParameterTypes } | |
if ($NativeCallingConvention) { $Properties['NativeCallingConvention'] = $NativeCallingConvention } | |
if ($Charset) { $Properties['Charset'] = $Charset } | |
if ($SetLastError) { $Properties['SetLastError'] = $SetLastError } | |
New-Object PSObject -Property $Properties | |
} | |
function Add-Win32Type | |
{ | |
<# | |
.SYNOPSIS | |
Creates a .NET type for an unmanaged Win32 function. | |
Author: Matthew Graeber (@mattifestation) | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: func | |
.DESCRIPTION | |
Add-Win32Type enables you to easily interact with unmanaged (i.e. | |
Win32 unmanaged) functions in PowerShell. After providing | |
Add-Win32Type with a function signature, a .NET type is created | |
using reflection (i.e. csc.exe is never called like with Add-Type). | |
The 'func' helper function can be used to reduce typing when defining | |
multiple function definitions. | |
.PARAMETER DllName | |
The name of the DLL. | |
.PARAMETER FunctionName | |
The name of the target function. | |
.PARAMETER ReturnType | |
The return type of the function. | |
.PARAMETER ParameterTypes | |
The function parameters. | |
.PARAMETER NativeCallingConvention | |
Specifies the native calling convention of the function. Defaults to | |
stdcall. | |
.PARAMETER Charset | |
If you need to explicitly call an 'A' or 'W' Win32 function, you can | |
specify the character set. | |
.PARAMETER SetLastError | |
Indicates whether the callee calls the SetLastError Win32 API | |
function before returning from the attributed method. | |
.PARAMETER Module | |
The in-memory module that will host the functions. Use | |
New-InMemoryModule to define an in-memory module. | |
.PARAMETER Namespace | |
An optional namespace to prepend to the type. Add-Win32Type defaults | |
to a namespace consisting only of the name of the DLL. | |
.EXAMPLE | |
$Mod = New-InMemoryModule -ModuleName Win32 | |
$FunctionDefinitions = @( | |
(func kernel32 GetProcAddress ([IntPtr]) @([IntPtr], [String]) -Charset Ansi -SetLastError), | |
(func kernel32 GetModuleHandle ([Intptr]) @([String]) -SetLastError), | |
(func ntdll RtlGetCurrentPeb ([IntPtr]) @()) | |
) | |
$Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32' | |
$Kernel32 = $Types['kernel32'] | |
$Ntdll = $Types['ntdll'] | |
$Ntdll::RtlGetCurrentPeb() | |
$ntdllbase = $Kernel32::GetModuleHandle('ntdll') | |
$Kernel32::GetProcAddress($ntdllbase, 'RtlGetCurrentPeb') | |
.NOTES | |
Inspired by Lee Holmes' Invoke-WindowsApi http://poshcode.org/2189 | |
When defining multiple function prototypes, it is ideal to provide | |
Add-Win32Type with an array of function signatures. That way, they | |
are all incorporated into the same in-memory module. | |
#> | |
[OutputType([Hashtable])] | |
Param( | |
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] | |
[String] | |
$DllName, | |
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] | |
[String] | |
$FunctionName, | |
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] | |
[Type] | |
$ReturnType, | |
[Parameter(ValueFromPipelineByPropertyName = $True)] | |
[Type[]] | |
$ParameterTypes, | |
[Parameter(ValueFromPipelineByPropertyName = $True)] | |
[Runtime.InteropServices.CallingConvention] | |
$NativeCallingConvention = [Runtime.InteropServices.CallingConvention]::StdCall, | |
[Parameter(ValueFromPipelineByPropertyName = $True)] | |
[Runtime.InteropServices.CharSet] | |
$Charset = [Runtime.InteropServices.CharSet]::Auto, | |
[Parameter(ValueFromPipelineByPropertyName = $True)] | |
[Switch] | |
$SetLastError, | |
[Parameter(Mandatory = $True)] | |
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] | |
$Module, | |
[ValidateNotNull()] | |
[String] | |
$Namespace = '' | |
) | |
BEGIN | |
{ | |
$TypeHash = @{} | |
} | |
PROCESS | |
{ | |
if ($Module -is [Reflection.Assembly]) | |
{ | |
if ($Namespace) | |
{ | |
$TypeHash[$DllName] = $Module.GetType("$Namespace.$DllName") | |
} | |
else | |
{ | |
$TypeHash[$DllName] = $Module.GetType($DllName) | |
} | |
} | |
else | |
{ | |
# Define one type for each DLL | |
if (!$TypeHash.ContainsKey($DllName)) | |
{ | |
if ($Namespace) | |
{ | |
$TypeHash[$DllName] = $Module.DefineType("$Namespace.$DllName", 'Public,BeforeFieldInit') | |
} | |
else | |
{ | |
$TypeHash[$DllName] = $Module.DefineType($DllName, 'Public,BeforeFieldInit') | |
} | |
} | |
$Method = $TypeHash[$DllName].DefineMethod( | |
$FunctionName, | |
'Public,Static,PinvokeImpl', | |
$ReturnType, | |
$ParameterTypes) | |
# Make each ByRef parameter an Out parameter | |
$i = 1 | |
ForEach($Parameter in $ParameterTypes) | |
{ | |
if ($Parameter.IsByRef) | |
{ | |
[void] $Method.DefineParameter($i, 'Out', $Null) | |
} | |
$i++ | |
} | |
$DllImport = [Runtime.InteropServices.DllImportAttribute] | |
$SetLastErrorField = $DllImport.GetField('SetLastError') | |
$CallingConventionField = $DllImport.GetField('CallingConvention') | |
$CharsetField = $DllImport.GetField('CharSet') | |
if ($SetLastError) { $SLEValue = $True } else { $SLEValue = $False } | |
# Equivalent to C# version of [DllImport(DllName)] | |
$Constructor = [Runtime.InteropServices.DllImportAttribute].GetConstructor([String]) | |
$DllImportAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($Constructor, | |
$DllName, [Reflection.PropertyInfo[]] @(), [Object[]] @(), | |
[Reflection.FieldInfo[]] @($SetLastErrorField, $CallingConventionField, $CharsetField), | |
[Object[]] @($SLEValue, ([Runtime.InteropServices.CallingConvention] $NativeCallingConvention), ([Runtime.InteropServices.CharSet] $Charset))) | |
$Method.SetCustomAttribute($DllImportAttribute) | |
} | |
} | |
END | |
{ | |
if ($Module -is [Reflection.Assembly]) | |
{ | |
return $TypeHash | |
} | |
$ReturnTypes = @{} | |
ForEach ($Key in $TypeHash.Keys) | |
{ | |
$Type = $TypeHash[$Key].CreateType() | |
$ReturnTypes[$Key] = $Type | |
} | |
return $ReturnTypes | |
} | |
} | |
function psenum | |
{ | |
<# | |
.SYNOPSIS | |
Creates an in-memory enumeration for use in your PowerShell session. | |
Author: Matthew Graeber (@mattifestation) | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: None | |
.DESCRIPTION | |
The 'psenum' function facilitates the creation of enums entirely in | |
memory using as close to a "C style" as PowerShell will allow. | |
.PARAMETER Module | |
The in-memory module that will host the enum. Use | |
New-InMemoryModule to define an in-memory module. | |
.PARAMETER FullName | |
The fully-qualified name of the enum. | |
.PARAMETER Type | |
The type of each enum element. | |
.PARAMETER EnumElements | |
A hashtable of enum elements. | |
.PARAMETER Bitfield | |
Specifies that the enum should be treated as a bitfield. | |
.EXAMPLE | |
$Mod = New-InMemoryModule -ModuleName Win32 | |
$ImageSubsystem = psenum $Mod PE.IMAGE_SUBSYSTEM UInt16 @{ | |
UNKNOWN = 0 | |
NATIVE = 1 # Image doesn't require a subsystem. | |
WINDOWS_GUI = 2 # Image runs in the Windows GUI subsystem. | |
WINDOWS_CUI = 3 # Image runs in the Windows character subsystem. | |
OS2_CUI = 5 # Image runs in the OS/2 character subsystem. | |
POSIX_CUI = 7 # Image runs in the Posix character subsystem. | |
NATIVE_WINDOWS = 8 # Image is a native Win9x driver. | |
WINDOWS_CE_GUI = 9 # Image runs in the Windows CE subsystem. | |
EFI_APPLICATION = 10 | |
EFI_BOOT_SERVICE_DRIVER = 11 | |
EFI_RUNTIME_DRIVER = 12 | |
EFI_ROM = 13 | |
XBOX = 14 | |
WINDOWS_BOOT_APPLICATION = 16 | |
} | |
.NOTES | |
PowerShell purists may disagree with the naming of this function but | |
again, this was developed in such a way so as to emulate a "C style" | |
definition as closely as possible. Sorry, I'm not going to name it | |
New-Enum. :P | |
#> | |
[OutputType([Type])] | |
Param | |
( | |
[Parameter(Position = 0, Mandatory = $True)] | |
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] | |
$Module, | |
[Parameter(Position = 1, Mandatory = $True)] | |
[ValidateNotNullOrEmpty()] | |
[String] | |
$FullName, | |
[Parameter(Position = 2, Mandatory = $True)] | |
[Type] | |
$Type, | |
[Parameter(Position = 3, Mandatory = $True)] | |
[ValidateNotNullOrEmpty()] | |
[Hashtable] | |
$EnumElements, | |
[Switch] | |
$Bitfield | |
) | |
if ($Module -is [Reflection.Assembly]) | |
{ | |
return ($Module.GetType($FullName)) | |
} | |
$EnumType = $Type -as [Type] | |
$EnumBuilder = $Module.DefineEnum($FullName, 'Public', $EnumType) | |
if ($Bitfield) | |
{ | |
$FlagsConstructor = [FlagsAttribute].GetConstructor(@()) | |
$FlagsCustomAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($FlagsConstructor, @()) | |
$EnumBuilder.SetCustomAttribute($FlagsCustomAttribute) | |
} | |
ForEach ($Key in $EnumElements.Keys) | |
{ | |
# Apply the specified enum type to each element | |
$Null = $EnumBuilder.DefineLiteral($Key, $EnumElements[$Key] -as $EnumType) | |
} | |
$EnumBuilder.CreateType() | |
} | |
# A helper function used to reduce typing while defining struct | |
# fields. | |
function field | |
{ | |
Param | |
( | |
[Parameter(Position = 0, Mandatory = $True)] | |
[UInt16] | |
$Position, | |
[Parameter(Position = 1, Mandatory = $True)] | |
[Type] | |
$Type, | |
[Parameter(Position = 2)] | |
[UInt16] | |
$Offset, | |
[Object[]] | |
$MarshalAs | |
) | |
@{ | |
Position = $Position | |
Type = $Type -as [Type] | |
Offset = $Offset | |
MarshalAs = $MarshalAs | |
} | |
} | |
function struct | |
{ | |
<# | |
.SYNOPSIS | |
Creates an in-memory struct for use in your PowerShell session. | |
Author: Matthew Graeber (@mattifestation) | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: field | |
.DESCRIPTION | |
The 'struct' function facilitates the creation of structs entirely in | |
memory using as close to a "C style" as PowerShell will allow. Struct | |
fields are specified using a hashtable where each field of the struct | |
is comprosed of the order in which it should be defined, its .NET | |
type, and optionally, its offset and special marshaling attributes. | |
One of the features of 'struct' is that after your struct is defined, | |
it will come with a built-in GetSize method as well as an explicit | |
converter so that you can easily cast an IntPtr to the struct without | |
relying upon calling SizeOf and/or PtrToStructure in the Marshal | |
class. | |
.PARAMETER Module | |
The in-memory module that will host the struct. Use | |
New-InMemoryModule to define an in-memory module. | |
.PARAMETER FullName | |
The fully-qualified name of the struct. | |
.PARAMETER StructFields | |
A hashtable of fields. Use the 'field' helper function to ease | |
defining each field. | |
.PARAMETER PackingSize | |
Specifies the memory alignment of fields. | |
.PARAMETER ExplicitLayout | |
Indicates that an explicit offset for each field will be specified. | |
.EXAMPLE | |
$Mod = New-InMemoryModule -ModuleName Win32 | |
$ImageDosSignature = psenum $Mod PE.IMAGE_DOS_SIGNATURE UInt16 @{ | |
DOS_SIGNATURE = 0x5A4D | |
OS2_SIGNATURE = 0x454E | |
OS2_SIGNATURE_LE = 0x454C | |
VXD_SIGNATURE = 0x454C | |
} | |
$ImageDosHeader = struct $Mod PE.IMAGE_DOS_HEADER @{ | |
e_magic = field 0 $ImageDosSignature | |
e_cblp = field 1 UInt16 | |
e_cp = field 2 UInt16 | |
e_crlc = field 3 UInt16 | |
e_cparhdr = field 4 UInt16 | |
e_minalloc = field 5 UInt16 | |
e_maxalloc = field 6 UInt16 | |
e_ss = field 7 UInt16 | |
e_sp = field 8 UInt16 | |
e_csum = field 9 UInt16 | |
e_ip = field 10 UInt16 | |
e_cs = field 11 UInt16 | |
e_lfarlc = field 12 UInt16 | |
e_ovno = field 13 UInt16 | |
e_res = field 14 UInt16[] -MarshalAs @('ByValArray', 4) | |
e_oemid = field 15 UInt16 | |
e_oeminfo = field 16 UInt16 | |
e_res2 = field 17 UInt16[] -MarshalAs @('ByValArray', 10) | |
e_lfanew = field 18 Int32 | |
} | |
# Example of using an explicit layout in order to create a union. | |
$TestUnion = struct $Mod TestUnion @{ | |
field1 = field 0 UInt32 0 | |
field2 = field 1 IntPtr 0 | |
} -ExplicitLayout | |
.NOTES | |
PowerShell purists may disagree with the naming of this function but | |
again, this was developed in such a way so as to emulate a "C style" | |
definition as closely as possible. Sorry, I'm not going to name it | |
New-Struct. :P | |
#> | |
[OutputType([Type])] | |
Param | |
( | |
[Parameter(Position = 1, Mandatory = $True)] | |
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] | |
$Module, | |
[Parameter(Position = 2, Mandatory = $True)] | |
[ValidateNotNullOrEmpty()] | |
[String] | |
$FullName, | |
[Parameter(Position = 3, Mandatory = $True)] | |
[ValidateNotNullOrEmpty()] | |
[Hashtable] | |
$StructFields, | |
[Reflection.Emit.PackingSize] | |
$PackingSize = [Reflection.Emit.PackingSize]::Unspecified, | |
[Switch] | |
$ExplicitLayout | |
) | |
if ($Module -is [Reflection.Assembly]) | |
{ | |
return ($Module.GetType($FullName)) | |
} | |
[Reflection.TypeAttributes] $StructAttributes = 'AnsiClass, | |
Class, | |
Public, | |
Sealed, | |
BeforeFieldInit' | |
if ($ExplicitLayout) | |
{ | |
$StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::ExplicitLayout | |
} | |
else | |
{ | |
$StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::SequentialLayout | |
} | |
$StructBuilder = $Module.DefineType($FullName, $StructAttributes, [ValueType], $PackingSize) | |
$ConstructorInfo = [Runtime.InteropServices.MarshalAsAttribute].GetConstructors()[0] | |
$SizeConst = @([Runtime.InteropServices.MarshalAsAttribute].GetField('SizeConst')) | |
$Fields = New-Object Hashtable[]($StructFields.Count) | |
# Sort each field according to the orders specified | |
# Unfortunately, PSv2 doesn't have the luxury of the | |
# hashtable [Ordered] accelerator. | |
ForEach ($Field in $StructFields.Keys) | |
{ | |
$Index = $StructFields[$Field]['Position'] | |
$Fields[$Index] = @{FieldName = $Field; Properties = $StructFields[$Field]} | |
} | |
ForEach ($Field in $Fields) | |
{ | |
$FieldName = $Field['FieldName'] | |
$FieldProp = $Field['Properties'] | |
$Offset = $FieldProp['Offset'] | |
$Type = $FieldProp['Type'] | |
$MarshalAs = $FieldProp['MarshalAs'] | |
$NewField = $StructBuilder.DefineField($FieldName, $Type, 'Public') | |
if ($MarshalAs) | |
{ | |
$UnmanagedType = $MarshalAs[0] -as ([Runtime.InteropServices.UnmanagedType]) | |
if ($MarshalAs[1]) | |
{ | |
$Size = $MarshalAs[1] | |
$AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, | |
$UnmanagedType, $SizeConst, @($Size)) | |
} | |
else | |
{ | |
$AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, [Object[]] @($UnmanagedType)) | |
} | |
$NewField.SetCustomAttribute($AttribBuilder) | |
} | |
if ($ExplicitLayout) { $NewField.SetOffset($Offset) } | |
} | |
# Make the struct aware of its own size. | |
# No more having to call [Runtime.InteropServices.Marshal]::SizeOf! | |
$SizeMethod = $StructBuilder.DefineMethod('GetSize', | |
'Public, Static', | |
[Int], | |
[Type[]] @()) | |
$ILGenerator = $SizeMethod.GetILGenerator() | |
# Thanks for the help, Jason Shirk! | |
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder) | |
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Call, | |
[Type].GetMethod('GetTypeFromHandle')) | |
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Call, | |
[Runtime.InteropServices.Marshal].GetMethod('SizeOf', [Type[]] @([Type]))) | |
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Ret) | |
# Allow for explicit casting from an IntPtr | |
# No more having to call [Runtime.InteropServices.Marshal]::PtrToStructure! | |
$ImplicitConverter = $StructBuilder.DefineMethod('op_Implicit', | |
'PrivateScope, Public, Static, HideBySig, SpecialName', | |
$StructBuilder, | |
[Type[]] @([IntPtr])) | |
$ILGenerator2 = $ImplicitConverter.GetILGenerator() | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Nop) | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldarg_0) | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder) | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call, | |
[Type].GetMethod('GetTypeFromHandle')) | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call, | |
[Runtime.InteropServices.Marshal].GetMethod('PtrToStructure', [Type[]] @([IntPtr], [Type]))) | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Unbox_Any, $StructBuilder) | |
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ret) | |
$StructBuilder.CreateType() | |
} | |
######################################################## | |
# | |
# Expose the Win32API functions and datastructures below | |
# using PSReflect. | |
# Warning: Once these are executed, they are baked in | |
# and can't be changed while the script is running! | |
# | |
######################################################## | |
$Mod = New-InMemoryModule -ModuleName Win32 | |
# all of the Win32 API functions we need | |
$FunctionDefinitions = @( | |
(func netapi32 NetShareEnum ([Int]) @([String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())), | |
(func netapi32 NetApiBufferFree ([Int]) @([IntPtr])) | |
) | |
# the NetShareEnum result structure | |
$SHARE_INFO_1 = struct $Mod SHARE_INFO_1 @{ | |
shi1_netname = field 0 String -MarshalAs @('LPWStr') | |
shi1_type = field 1 UInt32 | |
shi1_remark = field 2 String -MarshalAs @('LPWStr') | |
} | |
$Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32' | |
$Netapi32 = $Types['netapi32'] | |
######################################################## | |
# | |
# PowerView helpers. | |
# | |
######################################################## | |
function Export-PowerViewCSV { | |
<# | |
.SYNOPSIS | |
This function exports to a .csv in a thread-safe manner. | |
Based partially on Dmitry Sotnikov's Export-CSV code | |
at http://poshcode.org/1590 | |
.LINK | |
http://poshcode.org/1590 | |
http://dmitrysotnikov.wordpress.com/2010/01/19/Export-Csv-append/ | |
#> | |
Param( | |
[Parameter(Mandatory=$True, ValueFromPipeline=$True, | |
ValueFromPipelineByPropertyName=$True)] | |
[System.Management.Automation.PSObject] | |
$InputObject, | |
[Parameter(Mandatory=$True, Position=0)] | |
[Alias('PSPath')] | |
[String] | |
$OutFile | |
) | |
process { | |
$ObjectCSV = $InputObject | ConvertTo-Csv -NoTypeInformation | |
# mutex so threaded code doesn't stomp on the output file | |
$Mutex = New-Object System.Threading.Mutex $False,'CSVMutex'; | |
$Null = $Mutex.WaitOne() | |
if (Test-Path -Path $OutFile) { | |
# hack to skip the first line of output if the file already exists | |
$ObjectCSV | Foreach-Object {$Start=$True}{if ($Start) {$Start=$False} else {$_}} | Out-File -Encoding 'ASCII' -Append -FilePath $OutFile | |
} | |
else { | |
$ObjectCSV | Out-File -Encoding 'ASCII' -Append -FilePath $OutFile | |
} | |
$Mutex.ReleaseMutex() | |
} | |
} | |
function Get-NameField { | |
# function that attempts to extract the appropriate field name | |
# from various passed objects. This is so functions can have | |
# multiple types of objects passed on the pipeline. | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory=$True,ValueFromPipeline=$True)] | |
$Object | |
) | |
process { | |
if($Object) { | |
if ( [bool]($Object.PSobject.Properties.name -match "dnshostname") ) { | |
# objects from Get-NetComputer | |
$Object.dnshostname | |
} | |
elseif ( [bool]($Object.PSobject.Properties.name -match "name") ) { | |
# objects from Get-NetDomainController | |
$Object.name | |
} | |
else { | |
# strings and catch alls | |
$Object | |
} | |
} | |
else { | |
return $Null | |
} | |
} | |
} | |
function Convert-LDAPProperty { | |
# helper to convert specific LDAP property result fields | |
param( | |
[Parameter(Mandatory=$True,ValueFromPipeline=$True)] | |
[ValidateNotNullOrEmpty()] | |
$Properties | |
) | |
$ObjectProperties = @{} | |
$Properties.PropertyNames | ForEach-Object { | |
if (($_ -eq "objectsid") -or ($_ -eq "sidhistory")) { | |
# convert the SID to a string | |
$ObjectProperties[$_] = (New-Object System.Security.Principal.SecurityIdentifier($Properties[$_][0],0)).Value | |
} | |
elseif($_ -eq "objectguid") { | |
# convert the GUID to a string | |
$ObjectProperties[$_] = (New-Object Guid (,$Properties[$_][0])).Guid | |
} | |
elseif( ($_ -eq "lastlogon") -or ($_ -eq "lastlogontimestamp") -or ($_ -eq "pwdlastset") -or ($_ -eq "lastlogoff") -or ($_ -eq "badPasswordTime") ) { | |
# convert timestamps | |
if ($Properties[$_][0] -is [System.MarshalByRefObject]) { | |
# if we have a System.__ComObject | |
$Temp = $Properties[$_][0] | |
[Int32]$High = $Temp.GetType().InvokeMember("HighPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) | |
[Int32]$Low = $Temp.GetType().InvokeMember("LowPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) | |
$ObjectProperties[$_] = ([datetime]::FromFileTime([Int64]("0x{0:x8}{1:x8}" -f $High, $Low))) | |
} | |
else { | |
$ObjectProperties[$_] = ([datetime]::FromFileTime(($Properties[$_][0]))) | |
} | |
} | |
elseif($Properties[$_][0] -is [System.MarshalByRefObject]) { | |
# convert misc com objects | |
$Prop = $Properties[$_] | |
try { | |
$Temp = $Prop[$_][0] | |
Write-Verbose $_ | |
[Int32]$High = $Temp.GetType().InvokeMember("HighPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) | |
[Int32]$Low = $Temp.GetType().InvokeMember("LowPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) | |
$ObjectProperties[$_] = [Int64]("0x{0:x8}{1:x8}" -f $High, $Low) | |
} | |
catch { | |
$ObjectProperties[$_] = $Prop[$_] | |
} | |
} | |
elseif($Properties[$_].count -eq 1) { | |
$ObjectProperties[$_] = $Properties[$_][0] | |
} | |
else { | |
$ObjectProperties[$_] = $Properties[$_] | |
} | |
} | |
New-Object -TypeName PSObject -Property $ObjectProperties | |
} | |
function Convert-NT4toCanonical { | |
<# | |
.SYNOPSIS | |
Converts a user/group NT4 name (i.e. dev/john) to canonical format. | |
Based on Bill Stewart's code from this article: | |
http://windowsitpro.com/active-directory/translating-active-directory-object-names-between-formats | |
.PARAMETER ObjectName | |
The user/group name to convert, needs to be in 'DOMAIN\user' format. | |
.EXAMPLE | |
PS C:\> Convert-NT4toCanonical -ObjectName "dev\dfm" | |
Returns "dev.testlab.local/Users/Dave" | |
.LINK | |
http://windowsitpro.com/active-directory/translating-active-directory-object-names-between-formats | |
#> | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory=$True,ValueFromPipeline=$True)] | |
[String] | |
$ObjectName | |
) | |
process { | |
$ObjectName = $ObjectName -replace "/","\" | |
if($ObjectName.contains("\")) { | |
# if we get a DOMAIN\user format, try to extract the domain | |
$Domain = $ObjectName.split("\")[0] | |
} | |
# Accessor functions to simplify calls to NameTranslate | |
function Invoke-Method([__ComObject] $Object, [String] $Method, $Parameters) { | |
$Output = $Object.GetType().InvokeMember($Method, "InvokeMethod", $Null, $Object, $Parameters) | |
if ( $Output ) { $Output } | |
} | |
function Set-Property([__ComObject] $Object, [String] $Property, $Parameters) { | |
[Void] $Object.GetType().InvokeMember($Property, "SetProperty", $Null, $Object, $Parameters) | |
} | |
$Translate = New-Object -ComObject NameTranslate | |
try { | |
Invoke-Method $Translate "Init" (1, $Domain) | |
} | |
catch [System.Management.Automation.MethodInvocationException] { | |
Write-Debug "Error with translate init in Convert-NT4toCanonical: $_" | |
} | |
Set-Property $Translate "ChaseReferral" (0x60) | |
try { | |
Invoke-Method $Translate "Set" (3, $ObjectName) | |
(Invoke-Method $Translate "Get" (2)) | |
} | |
catch [System.Management.Automation.MethodInvocationException] { | |
Write-Debug "Error with translate Set/Get in Convert-NT4toCanonical: $_" | |
} | |
} | |
} | |
function Convert-SidToName { | |
<# | |
.SYNOPSIS | |
Converts a security identifier (SID) to a group/user name. | |
.PARAMETER SID | |
The SID to convert. | |
.EXAMPLE | |
PS C:\> Convert-SidToName S-1-5-21-2620891829-2411261497-1773853088-1105 | |
#> | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory=$True,ValueFromPipeline=$True)] | |
[String] | |
$SID | |
) | |
process { | |
try { | |
$SID2 = $SID.trim('*') | |
# try to resolve any built-in SIDs first | |
# from https://support.microsoft.com/en-us/kb/243330 | |
Switch ($SID2) | |
{ | |
'S-1-0' { 'Null Authority' } | |
'S-1-0-0' { 'Nobody' } | |
'S-1-1' { 'World Authority' } | |
'S-1-1-0' { 'Everyone' } | |
'S-1-2' { 'Local Authority' } | |
'S-1-2-0' { 'Local' } | |
'S-1-2-1' { 'Console Logon ' } | |
'S-1-3' { 'Creator Authority' } | |
'S-1-3-0' { 'Creator Owner' } | |
'S-1-3-1' { 'Creator Group' } | |
'S-1-3-2' { 'Creator Owner Server' } | |
'S-1-3-3' { 'Creator Group Server' } | |
'S-1-3-4' { 'Owner Rights' } | |
'S-1-4' { 'Non-unique Authority' } | |
'S-1-5' { 'NT Authority' } | |
'S-1-5-1' { 'Dialup' } | |
'S-1-5-2' { 'Network' } | |
'S-1-5-3' { 'Batch' } | |
'S-1-5-4' { 'Interactive' } | |
'S-1-5-6' { 'Service' } | |
'S-1-5-7' { 'Anonymous' } | |
'S-1-5-8' { 'Proxy' } | |
'S-1-5-9' { 'Enterprise Domain Controllers' } | |
'S-1-5-10' { 'Principal Self' } | |
'S-1-5-11' { 'Authenticated Users' } | |
'S-1-5-12' { 'Restricted Code' } | |
'S-1-5-13' { 'Terminal Server Users' } | |
'S-1-5-14' { 'Remote Interactive Logon' } | |
'S-1-5-15' { 'This Organization ' } | |
'S-1-5-17' { 'This Organization ' } | |
'S-1-5-18' { 'Local System' } | |
'S-1-5-19' { 'NT Authority' } | |
'S-1-5-20' { 'NT Authority' } | |
'S-1-5-80-0' { 'All Services ' } | |
'S-1-5-32-544' { 'BUILTIN\Administrators' } | |
'S-1-5-32-545' { 'BUILTIN\Users' } | |
'S-1-5-32-546' { 'BUILTIN\Guests' } | |
'S-1-5-32-547' { 'BUILTIN\Power Users' } | |
'S-1-5-32-548' { 'BUILTIN\Account Operators' } | |
'S-1-5-32-549' { 'BUILTIN\Server Operators' } | |
'S-1-5-32-550' { 'BUILTIN\Print Operators' } | |
'S-1-5-32-551' { 'BUILTIN\Backup Operators' } | |
'S-1-5-32-552' { 'BUILTIN\Replicators' } | |
'S-1-5-32-554' { 'BUILTIN\Pre-Windows 2000 Compatible Access' } | |
'S-1-5-32-555' { 'BUILTIN\Remote Desktop Users' } | |
'S-1-5-32-556' { 'BUILTIN\Network Configuration Operators' } | |
'S-1-5-32-557' { 'BUILTIN\Incoming Forest Trust Builders' } | |
'S-1-5-32-558' { 'BUILTIN\Performance Monitor Users' } | |
'S-1-5-32-559' { 'BUILTIN\Performance Log Users' } | |
'S-1-5-32-560' { 'BUILTIN\Windows Authorization Access Group' } | |
'S-1-5-32-561' { 'BUILTIN\Terminal Server License Servers' } | |
'S-1-5-32-562' { 'BUILTIN\Distributed COM Users' } | |
'S-1-5-32-569' { 'BUILTIN\Cryptographic Operators' } | |
'S-1-5-32-573' { 'BUILTIN\Event Log Readers' } | |
'S-1-5-32-574' { 'BUILTIN\Certificate Service DCOM Access' } | |
'S-1-5-32-575' { 'BUILTIN\RDS Remote Access Servers' } | |
'S-1-5-32-576' { 'BUILTIN\RDS Endpoint Servers' } | |
'S-1-5-32-577' { 'BUILTIN\RDS Management Servers' } | |
'S-1-5-32-578' { 'BUILTIN\Hyper-V Administrators' } | |
'S-1-5-32-579' { 'BUILTIN\Access Control Assistance Operators' } | |
'S-1-5-32-580' { 'BUILTIN\Access Control Assistance Operators' } | |
Default { | |
$Obj = (New-Object System.Security.Principal.SecurityIdentifier($SID2)) | |
$Obj.Translate( [System.Security.Principal.NTAccount]).Value | |
} | |
} | |
} | |
catch { | |
# Write-Warning "Invalid SID: $SID" | |
$SID | |
} | |
} | |
} | |
function Invoke-ThreadedFunction { | |
# Helper used by any threaded host enumeration functions | |
[CmdletBinding()] | |
param( | |
[Parameter(Position=0,Mandatory=$True)] | |
[String[]] | |
$ComputerName, | |
[Parameter(Position=1,Mandatory=$True)] | |
[System.Management.Automation.ScriptBlock] | |
$ScriptBlock, | |
[Parameter(Position=2)] | |
[Hashtable] | |
$ScriptParameters, | |
[Int] | |
$Threads = 20, | |
[Switch] | |
$NoImports | |
) | |
begin { | |
if ($PSBoundParameters['Debug']) { | |
$DebugPreference = 'Continue' | |
} | |
Write-Verbose "[*] Total number of hosts: $($ComputerName.count)" | |
# Adapted from: | |
# http://powershell.org/wp/forums/topic/invpke-parallel-need-help-to-clone-the-current-runspace/ | |
$SessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault() | |
$SessionState.ApartmentState = [System.Threading.Thread]::CurrentThread.GetApartmentState() | |
# import the current session state's variables and functions so the chained PowerView | |
# functionality can be used by the threaded blocks | |
if(!$NoImports) { | |
# grab all the current variables for this runspace | |
$MyVars = Get-Variable -Scope 2 | |
# these Variables are added by Runspace.Open() Method and produce Stop errors if you add them twice | |
$VorbiddenVars = @("?","args","ConsoleFileName","Error","ExecutionContext","false","HOME","Host","input","InputObject","MaximumAliasCount","MaximumDriveCount","MaximumErrorCount","MaximumFunctionCount","MaximumHistoryCount","MaximumVariableCount","MyInvocation","null","PID","PSBoundParameters","PSCommandPath","PSCulture","PSDefaultParameterValues","PSHOME","PSScriptRoot","PSUICulture","PSVersionTable","PWD","ShellId","SynchronizedHash","true") | |
# Add Variables from Parent Scope (current runspace) into the InitialSessionState | |
ForEach($Var in $MyVars) { | |
if($VorbiddenVars -NotContains $Var.Name) { | |
$SessionState.Variables.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateVariableEntry -ArgumentList $Var.name,$Var.Value,$Var.description,$Var.options,$Var.attributes)) | |
} | |
} | |
# Add Functions from current runspace to the InitialSessionState | |
ForEach($Function in (Get-ChildItem Function:)) { | |
$SessionState.Commands.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateFunctionEntry -ArgumentList $Function.Name, $Function.Definition)) | |
} | |
} | |
# threading adapted from | |
# https://github.com/darkoperator/Posh-SecMod/blob/master/Discovery/Discovery.psm1#L407 | |
# Thanks Carlos! | |
# create a pool of maxThread runspaces | |
$Pool = [runspacefactory]::CreateRunspacePool(1, $Threads, $SessionState, $Host) | |
$Pool.Open() | |
$Jobs = @() | |
$PS = @() | |
$Wait = @() | |
$Counter = 0 | |
} | |
process { | |
ForEach ($Computer in $ComputerName) { | |
# make sure we get a server name | |
if ($Computer -ne '') { | |
# Write-Verbose "[*] Enumerating server $Computer ($($Counter+1) of $($ComputerName.count))" | |
While ($($Pool.GetAvailableRunspaces()) -le 0) { | |
Start-Sleep -MilliSeconds 500 | |
} | |
# create a "powershell pipeline runner" | |
$PS += [powershell]::create() | |
$PS[$Counter].runspacepool = $Pool | |
# add the script block + arguments | |
$Null = $PS[$Counter].AddScript($ScriptBlock).AddParameter('ComputerName', $Computer) | |
if($ScriptParameters) { | |
ForEach ($Param in $ScriptParameters.GetEnumerator()) { | |
$Null = $PS[$Counter].AddParameter($Param.Name, $Param.Value) | |
} | |
} | |
# start job | |
$Jobs += $PS[$Counter].BeginInvoke(); | |
# store wait handles for WaitForAll call | |
$Wait += $Jobs[$Counter].AsyncWaitHandle | |
} | |
$Counter = $Counter + 1 | |
} | |
} | |
end { | |
Write-Verbose "Waiting for scanning threads to finish..." | |
$WaitTimeout = Get-Date | |
# set a 60 second timeout for the scanning threads | |
while ($($Jobs | Where-Object {$_.IsCompleted -eq $False}).count -gt 0 -or $($($(Get-Date) - $WaitTimeout).totalSeconds) -gt 60) { | |
Start-Sleep -MilliSeconds 500 | |
} | |
# end async call | |
for ($y = 0; $y -lt $Counter; $y++) { | |
try { | |
# complete async job | |
$PS[$y].EndInvoke($Jobs[$y]) | |
} catch { | |
Write-Warning "error: $_" | |
} | |
finally { | |
$PS[$y].Dispose() | |
} | |
} | |
$Pool.Dispose() | |
Write-Verbose "All threads completed!" | |
} | |
} | |
######################################################## | |
# | |
# Core PowerView commands used by share finding. | |
# | |
######################################################## | |
function Get-PathAcl { | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory=$True, ValueFromPipeline=$True)] | |
[string] | |
$Path | |
) | |
begin { | |
function Convert-FileRight { | |
# From http://stackoverflow.com/questions/28029872/retrieving-security-descriptor-and-getting-number-for-filesystemrights | |
[CmdletBinding()] | |
param( | |
[Int] | |
$FSR | |
) | |
$AccessMask = @{ | |
[uint32]'0x80000000' = 'GenericRead' | |
[uint32]'0x40000000' = 'GenericWrite' | |
[uint32]'0x20000000' = 'GenericExecute' | |
[uint32]'0x10000000' = 'GenericAll' | |
[uint32]'0x02000000' = 'MaximumAllowed' | |
[uint32]'0x01000000' = 'AccessSystemSecurity' | |
[uint32]'0x00100000' = 'Synchronize' | |
[uint32]'0x00080000' = 'WriteOwner' | |
[uint32]'0x00040000' = 'WriteDAC' | |
[uint32]'0x00020000' = 'ReadControl' | |
[uint32]'0x00010000' = 'Delete' | |
[uint32]'0x00000100' = 'WriteAttributes' | |
[uint32]'0x00000080' = 'ReadAttributes' | |
[uint32]'0x00000040' = 'DeleteChild' | |
[uint32]'0x00000020' = 'Execute/Traverse' | |
[uint32]'0x00000010' = 'WriteExtendedAttributes' | |
[uint32]'0x00000008' = 'ReadExtendedAttributes' | |
[uint32]'0x00000004' = 'AppendData/AddSubdirectory' | |
[uint32]'0x00000002' = 'WriteData/AddFile' | |
[uint32]'0x00000001' = 'ReadData/ListDirectory' | |
} | |
$SimplePermissions = @{ | |
[uint32]'0x1f01ff' = 'FullControl' | |
[uint32]'0x0301bf' = 'Modify' | |
[uint32]'0x0200a9' = 'ReadAndExecute' | |
[uint32]'0x02019f' = 'ReadAndWrite' | |
[uint32]'0x020089' = 'Read' | |
[uint32]'0x000116' = 'Write' | |
} | |
$Permissions = @() | |
# get simple permission | |
$Permissions += $SimplePermissions.Keys | % { | |
if (($FSR -band $_) -eq $_) { | |
$SimplePermissions[$_] | |
$FSR = $FSR -band (-not $_) | |
} | |
} | |
# get remaining extended permissions | |
$Permissions += $AccessMask.Keys | | |
? { $FSR -band $_ } | | |
% { $AccessMask[$_] } | |
($Permissions | ?{$_}) -join "," | |
} | |
} | |
process { | |
try { | |
$ACL = Get-Acl -Path $Path | |
$ACL.GetAccessRules($true,$true,[System.Security.Principal.SecurityIdentifier]) | ForEach-Object { | |
$Names = @() | |
if ($_.IdentityReference -match '^S-1-5-21-[0-9]+-[0-9]+-[0-9]+-[0-9]+') { | |
$Object = Get-ADObject -SID $_.IdentityReference | |
$Names = @() | |
$SIDs = @($Object.objectsid) | |
$SIDs | ForEach-Object { | |
$Names += ,@($_, (Convert-SidToName $_)) | |
} | |
} | |
else { | |
$Names += ,@($_.IdentityReference.Value, (Convert-SidToName $_.IdentityReference.Value)) | |
} | |
ForEach($Name in $Names) { | |
$Out = New-Object PSObject | |
$Out | Add-Member Noteproperty 'Path' $Path | |
$Out | Add-Member Noteproperty 'FileSystemRights' (Convert-FileRight -FSR $_.FileSystemRights.value__) | |
$Out | Add-Member Noteproperty 'IdentityReference' $Name[1] | |
$Out | Add-Member Noteproperty 'IdentitySID' $Name[0] | |
$Out | Add-Member Noteproperty 'AccessControlType' $_.AccessControlType | |
$Out | |
} | |
} | |
} | |
catch { | |
Write-Warning $_ | |
} | |
} | |
} | |
function Get-ADObject { | |
<# | |
.SYNOPSIS | |
Takes a domain SID and returns the user, group, or computer object | |
associated with it. | |
.PARAMETER SID | |
The SID of the domain object you're querying for. | |
.PARAMETER Name | |
The Name of the domain object you're querying for. | |
.PARAMETER SamAccountName | |
The SamAccountName of the domain object you're querying for. | |
.PARAMETER Domain | |
The domain to query for objects, defaults to the current domain. | |
.PARAMETER DomainController | |
Domain controller to reflect LDAP queries through. | |
.PARAMETER ADSpath | |
The LDAP source to search through, e.g. "LDAP://OU=secret,DC=testlab,DC=local" | |
Useful for OU queries. | |
.PARAMETER Filter | |
Additional LDAP filter string for the query. | |
.PARAMETER ReturnRaw | |
Switch. Return the raw object instead of translating its properties. | |
Used by Set-ADObject to modify object properties. | |
.PARAMETER PageSize | |
The PageSize to set for the LDAP searcher object. | |
.EXAMPLE | |
PS C:\> Get-ADObject -SID "S-1-5-21-2620891829-2411261497-1773853088-1110" | |
Get the domain object associated with the specified SID. | |
.EXAMPLE | |
PS C:\> Get-ADObject -ADSpath "CN=AdminSDHolder,CN=System,DC=testlab,DC=local" | |
Get the AdminSDHolder object for the testlab.local domain. | |
#> | |
[CmdletBinding()] | |
Param ( | |
[Parameter(ValueFromPipeline=$True)] | |
[String] | |
$SID, | |
[String] | |
$Name, | |
[String] | |
$SamAccountName, | |
[String] | |
$Domain, | |
[String] | |
$DomainController, | |
[String] | |
$ADSpath, | |
[String] | |
$Filter, | |
[Switch] | |
$ReturnRaw, | |
[ValidateRange(1,10000)] | |
[Int] | |
$PageSize = 200 | |
) | |
process { | |
if($SID) { | |
# if a SID is passed, try to resolve it to a reachable domain name for the searcher | |
try { | |
$Name = Convert-SidToName $SID | |
if($Name) { | |
$Canonical = Convert-NT4toCanonical -ObjectName $Name | |
if($Canonical) { | |
$Domain = $Canonical.split("/")[0] | |
} | |
else { | |
Write-Warning "Error resolving SID '$SID'" | |
return $Null | |
} | |
} | |
} | |
catch { | |
Write-Warning "Error resolving SID '$SID' : $_" | |
return $Null | |
} | |
} | |
$ObjectSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -ADSpath $ADSpath -PageSize $PageSize | |
if($ObjectSearcher) { | |
if($SID) { | |
$ObjectSearcher.filter = "(&(objectsid=$SID)$Filter)" | |
} | |
elseif($Name) { | |
$ObjectSearcher.filter = "(&(name=$Name)$Filter)" | |
} | |
elseif($SamAccountName) { | |
$ObjectSearcher.filter = "(&(samAccountName=$SamAccountName)$Filter)" | |
} | |
$ObjectSearcher.FindAll() | Where-Object {$_} | ForEach-Object { | |
if($ReturnRaw) { | |
$_ | |
} | |
else { | |
# convert/process the LDAP fields for each result | |
Convert-LDAPProperty -Properties $_.Properties | |
} | |
} | |
} | |
} | |
} | |
function Get-DomainSearcher { | |
<# | |
.SYNOPSIS | |
Helper used by various functions that takes an ADSpath and | |
domain specifier and builds the correct ADSI searcher object. | |
.PARAMETER Domain | |
The domain to use for the query, defaults to the current domain. | |
.PARAMETER DomainController | |
Domain controller to reflect LDAP queries through. | |
.PARAMETER ADSpath | |
The LDAP source to search through, e.g. "LDAP://OU=secret,DC=testlab,DC=local" | |
Useful for OU queries. | |
.PARAMETER ADSprefix | |
Prefix to set for the searcher (like "CN=Sites,CN=Configuration") | |
.PARAMETER PageSize | |
The PageSize to set for the LDAP searcher object. | |
.EXAMPLE | |
PS C:\> Get-DomainSearcher -Domain testlab.local | |
.EXAMPLE | |
PS C:\> Get-DomainSearcher -Domain testlab.local -DomainController SECONDARY.dev.testlab.local | |
#> | |
[CmdletBinding()] | |
param( | |
[String] | |
$Domain, | |
[String] | |
$DomainController, | |
[String] | |
$ADSpath, | |
[String] | |
$ADSprefix, | |
[ValidateRange(1,10000)] | |
[Int] | |
$PageSize = 200 | |
) | |
if(!$Domain) { | |
$Domain = (Get-NetDomain).name | |
} | |
else { | |
if(!$DomainController) { | |
try { | |
# if there's no -DomainController specified, try to pull the primary DC | |
# to reflect queries through | |
$DomainController = ((Get-NetDomain).PdcRoleOwner).Name | |
} | |
catch { | |
throw "Get-DomainSearcher: Error in retrieving PDC for current domain" | |
} | |
} | |
} | |
$SearchString = "LDAP://" | |
if($DomainController) { | |
$SearchString += $DomainController + "/" | |
} | |
if($ADSprefix) { | |
$SearchString += $ADSprefix + "," | |
} | |
if($ADSpath) { | |
if($ADSpath -like "GC://*") { | |
# if we're searching the global catalog | |
$DistinguishedName = $AdsPath | |
$SearchString = "" | |
} | |
else { | |
if($ADSpath -like "LDAP://*") { | |
$ADSpath = $ADSpath.Substring(7) | |
} | |
$DistinguishedName = $ADSpath | |
} | |
} | |
else { | |
$DistinguishedName = "DC=$($Domain.Replace('.', ',DC='))" | |
} | |
$SearchString += $DistinguishedName | |
$Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString) | |
$Searcher.PageSize = $PageSize | |
$Searcher | |
} | |
function Get-NetDomain { | |
<# | |
.SYNOPSIS | |
Returns a given domain object. | |
.PARAMETER Domain | |
The domain name to query for, defaults to the current domain. | |
.EXAMPLE | |
PS C:\> Get-NetDomain -Domain testlab.local | |
.LINK | |
http://social.technet.microsoft.com/Forums/scriptcenter/en-US/0c5b3f83-e528-4d49-92a4-dee31f4b481c/finding-the-dn-of-the-the-domain-without-admodule-in-powershell?forum=ITCG | |
#> | |
[CmdletBinding()] | |
param( | |
[Parameter(ValueFromPipeline=$True)] | |
[String] | |
$Domain | |
) | |
process { | |
if($Domain) { | |
$DomainContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Domain', $Domain) | |
try { | |
[System.DirectoryServices.ActiveDirectory.Domain]::GetDomain($DomainContext) | |
} | |
catch { | |
Write-Warning "The specified domain $Domain does not exist, could not be contacted, or there isn't an existing trust." | |
$Null | |
} | |
} | |
else { | |
[System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() | |
} | |
} | |
} | |
function Get-NetComputer { | |
<# | |
.SYNOPSIS | |
This function utilizes adsisearcher to query the current AD context | |
for current computer objects. Based off of Carlos Perez's Audit.psm1 | |
script in Posh-SecMod (link below). | |
.PARAMETER ComputerName | |
Return computers with a specific name, wildcards accepted. | |
.PARAMETER SPN | |
Return computers with a specific service principal name, wildcards accepted. | |
.PARAMETER OperatingSystem | |
Return computers with a specific operating system, wildcards accepted. | |
.PARAMETER ServicePack | |
Return computers with a specific service pack, wildcards accepted. | |
.PARAMETER Filter | |
A customized ldap filter string to use, e.g. "(description=*admin*)" | |
.PARAMETER Printers | |
Switch. Return only printers. | |
.PARAMETER Ping | |
Switch. Ping each host to ensure it's up before enumerating. | |
.PARAMETER FullData | |
Switch. Return full computer objects instead of just system names (the default). | |
.PARAMETER Domain | |
The domain to query for computers, defaults to the current domain. | |
.PARAMETER DomainController | |
Domain controller to reflect LDAP queries through. | |
.PARAMETER ADSpath | |
The LDAP source to search through, e.g. "LDAP://OU=secret,DC=testlab,DC=local" | |
Useful for OU queries. | |
.PARAMETER Unconstrained | |
Switch. Return computer objects that have unconstrained delegation. | |
.PARAMETER PageSize | |
The PageSize to set for the LDAP searcher object. | |
.EXAMPLE | |
PS C:\> Get-NetComputer | |
Returns the current computers in current domain. | |
.EXAMPLE | |
PS C:\> Get-NetComputer -SPN mssql* | |
Returns all MS SQL servers on the domain. | |
.EXAMPLE | |
PS C:\> Get-NetComputer -Domain testing | |
Returns the current computers in 'testing' domain. | |
.EXAMPLE | |
PS C:\> Get-NetComputer -Domain testing -FullData | |
Returns full computer objects in the 'testing' domain. | |
.LINK | |
https://github.com/darkoperator/Posh-SecMod/blob/master/Audit/Audit.psm1 | |
#> | |
[CmdletBinding()] | |
Param ( | |
[Parameter(ValueFromPipeline=$True)] | |
[Alias('HostName')] | |
[String] | |
$ComputerName = '*', | |
[String] | |
$SPN, | |
[String] | |
$OperatingSystem, | |
[String] | |
$ServicePack, | |
[String] | |
$Filter, | |
[Switch] | |
$Printers, | |
[Switch] | |
$Ping, | |
[Switch] | |
$FullData, | |
[String] | |
$Domain, | |
[String] | |
$DomainController, | |
[String] | |
$ADSpath, | |
[Switch] | |
$Unconstrained, | |
[ValidateRange(1,10000)] | |
[Int] | |
$PageSize = 200 | |
) | |
begin { | |
# so this isn't repeated if users are passed on the pipeline | |
$CompSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -ADSpath $ADSpath -PageSize $PageSize | |
} | |
process { | |
if ($CompSearcher) { | |
# if we're checking for unconstrained delegation | |
if($Unconstrained) { | |
Write-Verbose "Searching for computers with for unconstrained delegation" | |
$Filter += "(userAccountControl:1.2.840.113556.1.4.803:=524288)" | |
} | |
# set the filters for the seracher if it exists | |
if($Printers) { | |
Write-Verbose "Searching for printers" | |
# $CompSearcher.filter="(&(objectCategory=printQueue)$Filter)" | |
$Filter += "(objectCategory=printQueue)" | |
} | |
if($SPN) { | |
Write-Verbose "Searching for computers with SPN: $SPN" | |
$Filter += "(servicePrincipalName=$SPN)" | |
} | |
if($OperatingSystem) { | |
$Filter += "(operatingsystem=$OperatingSystem)" | |
} | |
if($ServicePack) { | |
$Filter += "(operatingsystemservicepack=$ServicePack)" | |
} | |
$CompSearcher.filter = "(&(sAMAccountType=805306369)(dnshostname=$ComputerName)$Filter)" | |
try { | |
$CompSearcher.FindAll() | Where-Object {$_} | ForEach-Object { | |
$Up = $True | |
if($Ping) { | |
# TODO: how can these results be piped to ping for a speedup? | |
$Up = Test-Connection -Count 1 -Quiet -ComputerName $_.properties.dnshostname | |
} | |
if($Up) { | |
# return full data objects | |
if ($FullData) { | |
# convert/process the LDAP fields for each result | |
Convert-LDAPProperty -Properties $_.Properties | |
} | |
else { | |
# otherwise we're just returning the DNS host name | |
$_.properties.dnshostname | |
} | |
} | |
} | |
} | |
catch { | |
Write-Warning "Error: $_" | |
} | |
} | |
} | |
} | |
function Get-NetShare { | |
<# | |
.SYNOPSIS | |
This function will execute the NetShareEnum Win32API call to query | |
a given host for open shares. This is a replacement for | |
"net share \\hostname" | |
.PARAMETER ComputerName | |
The hostname to query for shares. Also accepts IP addresses. | |
.OUTPUTS | |
SHARE_INFO_1 structure. A representation of the SHARE_INFO_1 | |
result structure which includes the name and note for each share. | |
.EXAMPLE | |
PS C:\> Get-NetShare | |
Returns active shares on the local host. | |
.EXAMPLE | |
PS C:\> Get-NetShare -ComputerName sqlserver | |
Returns active shares on the 'sqlserver' host | |
#> | |
[CmdletBinding()] | |
param( | |
[Parameter(ValueFromPipeline=$True)] | |
[Alias('HostName')] | |
[String] | |
$ComputerName = 'localhost' | |
) | |
begin { | |
if ($PSBoundParameters['Debug']) { | |
$DebugPreference = 'Continue' | |
} | |
} | |
process { | |
# process multiple host object types from the pipeline | |
$ComputerName = Get-NameField -Object $ComputerName | |
# arguments for NetShareEnum | |
$QueryLevel = 1 | |
$PtrInfo = [IntPtr]::Zero | |
$EntriesRead = 0 | |
$TotalRead = 0 | |
$ResumeHandle = 0 | |
# get the share information | |
$Result = $Netapi32::NetShareEnum($ComputerName, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle) | |
# Locate the offset of the initial intPtr | |
$Offset = $PtrInfo.ToInt64() | |
Write-Debug "Get-NetShare result: $Result" | |
# 0 = success | |
if (($Result -eq 0) -and ($Offset -gt 0)) { | |
# Work out how mutch to increment the pointer by finding out the size of the structure | |
$Increment = $SHARE_INFO_1::GetSize() | |
# parse all the result structures | |
for ($i = 0; ($i -lt $EntriesRead); $i++) { | |
# create a new int ptr at the given offset and cast | |
# the pointer as our result structure | |
$NewIntPtr = New-Object System.Intptr -ArgumentList $Offset | |
$Info = $NewIntPtr -as $SHARE_INFO_1 | |
# return all the sections of the structure | |
$Info | Select-Object * | |
$Offset = $NewIntPtr.ToInt64() | |
$Offset += $Increment | |
} | |
# free up the result buffer | |
$Null = $Netapi32::NetApiBufferFree($PtrInfo) | |
} | |
else | |
{ | |
switch ($Result) { | |
(5) {Write-Debug 'The user does not have access to the requested information.'} | |
(124) {Write-Debug 'The value specified for the level parameter is not valid.'} | |
(87) {Write-Debug 'The specified parameter is not valid.'} | |
(234) {Write-Debug 'More entries are available. Specify a large enough buffer to receive all entries.'} | |
(8) {Write-Debug 'Insufficient memory is available.'} | |
(2312) {Write-Debug 'A session does not exist with the computer name.'} | |
(2351) {Write-Debug 'The computer name is not valid.'} | |
(2221) {Write-Debug 'Username not found.'} | |
(53) {Write-Debug 'Hostname could not be found'} | |
} | |
} | |
} | |
} | |
######################################################## | |
# | |
# Share hunting functionality. | |
# | |
######################################################## | |
function Invoke-ShareFinder { | |
<# | |
.SYNOPSIS | |
This function finds the local domain name for a host using Get-NetDomain, | |
queries the domain for all active machines with Get-NetComputer, then for | |
each server it lists of active shares with Get-NetShare. Non-standard shares | |
can be filtered out with -Exclude* flags. | |
Author: @harmj0y | |
License: BSD 3-Clause | |
.PARAMETER ComputerName | |
Host array to enumerate, passable on the pipeline. | |
.PARAMETER ComputerFile | |
File of hostnames/IPs to search. | |
.PARAMETER ComputerFilter | |
Host filter name to query AD for, wildcards accepted. | |
.PARAMETER ComputerADSpath | |
The LDAP source to search through for hosts, e.g. "LDAP://OU=secret,DC=testlab,DC=local" | |
Useful for OU queries. | |
.PARAMETER OutFile | |
Output results to a specified csv output file. | |
.PARAMETER Delay | |
Delay between enumerating hosts, defaults to 0. | |
.PARAMETER Jitter | |
Jitter for the host delay, defaults to +/- 0.3. | |
.PARAMETER Domain | |
Domain to query for machines, defaults to the current domain. | |
.PARAMETER Threads | |
The maximum concurrent threads to execute. | |
.EXAMPLE | |
PS C:\> Invoke-ShareFinder -Threads 20 | |
Multi-threaded share finding, replaces Invoke-ShareFinderThreaded. | |
.EXAMPLE | |
PS C:\> Invoke-ShareFinder -Delay 60 | |
Find shares on the domain with a 60 second (+/- *.3) | |
randomized delay between touching each host. | |
.EXAMPLE | |
PS C:\> Invoke-ShareFinder -ComputerFile hosts.txt | |
Find shares for machines in the specified hosts file. | |
.LINK | |
http://blog.harmj0y.net | |
#> | |
[CmdletBinding()] | |
param( | |
[Parameter(Position=0,ValueFromPipeline=$True)] | |
[Alias('Hosts')] | |
[String[]] | |
$ComputerName, | |
[Alias('HostList')] | |
[String] | |
$ComputerFile, | |
[String] | |
$ComputerFilter, | |
[String[]] | |
$ComputerADSpath, | |
[String] | |
$OutFile = (Get-Date -Format "MM-dd-yyyy_hh-mm-ss") + ".csv", | |
[UInt32] | |
$Delay = 0, | |
[Double] | |
$Jitter = .3, | |
[String] | |
$Domain, | |
[ValidateRange(1,100)] | |
[Int] | |
$Threads = 20 | |
) | |
begin { | |
if ($PSBoundParameters['Debug']) { | |
$DebugPreference = 'Continue' | |
} | |
# random object for delay | |
$RandNo = New-Object System.Random | |
Write-Verbose "[*] Running Invoke-ShareFinder with delay of $Delay" | |
# if we're using a host file list, read the targets in and add them to the target list | |
if($ComputerFile) { | |
$ComputerName = Get-Content -Path $ComputerFile | |
} | |
if(!$ComputerName) { | |
[array]$ComputerName = @() | |
if(!$Domain) { | |
$Domain = @( (Get-NetDomain).name ) | |
} | |
if($ComputerADSpath) { | |
ForEach ($ADSPath in $ComputerADSpath) { | |
Write-Verbose "[*] Querying ADS path $ADSPath for hosts" | |
$ComputerName += Get-NetComputer -Domain $Domain -Filter $ComputerFilter -ADSpath $ADSPath | |
} | |
} | |
else { | |
Write-Verbose "[*] Querying domain $Domain for hosts" | |
$ComputerName += Get-NetComputer -Domain $Domain -Filter $ComputerFilter | |
} | |
# remove any null target hosts and uniquify the list | |
$ComputerName = $ComputerName | Where-Object { $_ } | Sort-Object -Unique | |
} | |
# script block that enumerates a server | |
$HostEnumBlock = { | |
param($ComputerName, $OutFile) | |
# make sure the host is up | |
$Up = Test-Connection -Count 1 -Quiet -ComputerName $ComputerName | |
if($Up) { | |
# get the shares for this host and check what we find | |
$Shares = Get-NetShare -ComputerName $ComputerName | |
ForEach ($Share in $Shares) { | |
Write-Debug "[*] Server share: $Share" | |
$NetName = $Share.shi1_netname | |
$Remark = $Share.shi1_remark | |
$Path = '\\'+$ComputerName+'\'+$NetName | |
# make sure we get a real share name back | |
if (($NetName) -and ($NetName.trim() -ne '')) { | |
try { | |
$Null = [IO.Directory]::GetFiles($Path) | |
$FoundShareACL = Get-PathAcl -Path $Path | |
$FoundShareACL | Add-Member Noteproperty 'Remark' $Remark | |
if($OutFile) { | |
$FoundShareACL | Export-PowerViewCSV -OutFile $OutFile | |
} | |
else { | |
$FoundShareACL | |
} | |
} | |
catch { | |
Write-Debug "Error accessing path $Path : $_" | |
} | |
} | |
} | |
} | |
} | |
} | |
process { | |
if($Threads) { | |
Write-Verbose "Using threading with threads = $Threads" | |
# if we're using threading, kick off the script block with Invoke-ThreadedFunction | |
$ScriptParams = @{ | |
'OutFile' = $OutFile | |
} | |
# kick off the threaded script block + arguments | |
Invoke-ThreadedFunction -ComputerName $ComputerName -ScriptBlock $HostEnumBlock -ScriptParameters $ScriptParams -Threads $Threads | |
} | |
else { | |
if(-not $NoPing -and ($ComputerName.count -ne 1)) { | |
# ping all hosts in parallel | |
$Ping = {param($ComputerName) if(Test-Connection -ComputerName $ComputerName -Count 1 -Quiet -ErrorAction Stop){$ComputerName}} | |
$ComputerName = Invoke-ThreadedFunction -NoImports -ComputerName $ComputerName -ScriptBlock $Ping -Threads 100 | |
} | |
Write-Verbose "[*] Total number of active hosts: $($ComputerName.count)" | |
$Counter = 0 | |
ForEach ($Computer in $ComputerName) { | |
$Counter = $Counter + 1 | |
# sleep for our semi-randomized interval | |
Start-Sleep -Seconds $RandNo.Next((1-$Jitter)*$Delay, (1+$Jitter)*$Delay) | |
Write-Verbose "[*] Enumerating server $Computer ($Counter of $($ComputerName.count))" | |
Invoke-Command -ScriptBlock $HostEnumBlock -ArgumentList $Computer, $OutFile | |
} | |
} | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment