Advertisement
opexxx

wmiexec.py

May 15th, 2014
353
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 8.40 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Copyright (c) 2003-2014 CORE Security Technologies
  3. #
  4. # This software is provided under under a slightly modified version
  5. # of the Apache Software License. See the accompanying LICENSE file
  6. # for more information.
  7. #
  8. # $Id$
  9. #
  10. # A similar approach to smbexec but executing commands through WMI.
  11. # Main advantage here is it runs under the user (has to be Admin)
  12. # account, not SYSTEM, plus, it doesn't generate noisy messages
  13. # in the event log that smbexec.py does when creating a service.
  14. # Drawback is it needs DCOM, hence, I have to be able to access
  15. # DCOM ports at the target machine.
  16. #
  17. # Author:
  18. #
  19. # Reference for:
  20. #  DCOM
  21. #
  22.  
  23. import sys
  24. import os
  25. import cmd
  26. import argparse
  27. import time
  28. import ntpath
  29.  
  30. from impacket import version, ntlm
  31. from impacket.smbconnection import *
  32. from impacket.dcerpc.v5.dcomrt import DCOMConnection
  33. from impacket.dcerpc.v5.dcom import wmi
  34. from impacket.dcerpc.v5.dtypes import NULL
  35.  
  36. OUTPUT_FILENAME = '__'
  37.  
  38. class WMIEXEC:
  39.     def __init__(self, command = '', username = '', password = '', domain = '', hashes = None, share = None, noOutput=False):
  40.         self.__command = command
  41.         self.__username = username
  42.         self.__password = password
  43.         self.__domain = domain
  44.         self.__lmhash = ''
  45.         self.__nthash = ''
  46.         self.__share = share
  47.         self.__noOutput = noOutput
  48.         if hashes is not None:
  49.             self.__lmhash, self.__nthash = hashes.split(':')
  50.  
  51.     def run(self, addr):
  52.         if self.__noOutput is False:
  53.             smbConnection = SMBConnection(addr, addr)
  54.             smbConnection.login(self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash)
  55.             dialect = smbConnection.getDialect()
  56.             if dialect == SMB_DIALECT:
  57.                 print("SMBv1 dialect used")
  58.             elif dialect == SMB2_DIALECT_002:
  59.                 print("SMBv2.0 dialect used")
  60.             elif dialect == SMB2_DIALECT_21:
  61.                 print("SMBv2.1 dialect used")
  62.             else:
  63.                 print("SMBv3.0 dialect used")
  64.         else:
  65.             smbConnection = None
  66.  
  67.         dcom = DCOMConnection(addr, self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, oxidResolver = True)
  68.  
  69.         iInterface = dcom.CoCreateInstanceEx(wmi.CLSID_WbemLevel1Login,wmi.IID_IWbemLevel1Login)
  70.         iWbemLevel1Login = wmi.IWbemLevel1Login(iInterface)
  71.         iWbemServices= iWbemLevel1Login.NTLMLogin('//./root/cimv2', NULL, NULL)
  72.         iWbemLevel1Login.RemRelease()
  73.  
  74.         win32Process,_ = iWbemServices.GetObject('Win32_Process')
  75.  
  76.         try:
  77.             self.shell = RemoteShell(self.__share, win32Process, smbConnection)
  78.             if self.__command != ' ':
  79.                 self.shell.onecmd(self.__command)
  80.             else:
  81.                 self.shell.cmdloop()
  82.         except  (Exception, KeyboardInterrupt), e:
  83.             #import traceback
  84.             #traceback.print_exc()
  85.             print e
  86.             if smbConnection is not None:
  87.                 smbConnection.logoff()
  88.             dcom.disconnect()
  89.             sys.stdout.flush()
  90.             sys.exit(1)
  91.  
  92.         if smbConnection is not None:
  93.             smbConnection.logoff()
  94.         dcom.disconnect()
  95.  
  96. class RemoteShell(cmd.Cmd):
  97.     def __init__(self, share, win32Process, smbConnection):
  98.         cmd.Cmd.__init__(self)
  99.         self.__share = share
  100.         self.__output = '\\' + OUTPUT_FILENAME
  101.         self.__outputBuffer = ''
  102.         self.__shell = 'cmd.exe /Q /c '
  103.         self.__win32Process = win32Process
  104.         self.__transferClient = smbConnection
  105.         self.__pwd = 'C:\\'
  106.         self.__noOutput = False
  107.         self.intro = '[!] Launching semi-interactive shell - Careful what you execute'
  108.  
  109.         # We don't wanna deal with timeouts from now on.
  110.         if self.__transferClient is not None:
  111.             self.__transferClient.setTimeout(100000)
  112.             self.do_cd('\\')
  113.         else:
  114.             self.__noOutput = True
  115.  
  116.     def do_shell(self, s):
  117.         os.system(s)
  118.  
  119.     def do_exit(self, s):
  120.         return True
  121.  
  122.     def emptyline(self):
  123.         return False
  124.  
  125.     def do_cd(self, s):
  126.         self.execute_remote('cd ' + s)
  127.         if len(self.__outputBuffer.strip('\r\n')) > 0:
  128.             print self.__outputBuffer
  129.             self.__outputBuffer = ''
  130.         else:
  131.             self.__pwd = ntpath.normpath(ntpath.join(self.__pwd, s))
  132.             self.execute_remote('cd ')
  133.             self.__pwd = self.__outputBuffer.strip('\r\n')
  134.             self.prompt = self.__pwd + '>'
  135.             self.__outputBuffer = ''
  136.  
  137.     def default(self, line):
  138.         # Let's try to guess if the user is trying to change drive
  139.         if len(line) == 2 and line[1] == ':':
  140.             # Execute the command and see if the drive is valid
  141.             self.execute_remote(line)
  142.             if len(self.__outputBuffer.strip('\r\n')) > 0:
  143.                 # Something went wrong
  144.                 print self.__outputBuffer
  145.                 self.__outputBuffer = ''
  146.             else:
  147.                 # Drive valid, now we should get the current path
  148.                 self.__pwd = line
  149.                 self.execute_remote('cd ')
  150.                 self.__pwd = self.__outputBuffer.strip('\r\n')
  151.                 self.prompt = self.__pwd + '>'
  152.                 self.__outputBuffer = ''
  153.         else:
  154.             if line != '':
  155.                 self.send_data(line)
  156.  
  157.     def get_output(self):
  158.         def output_callback(data):
  159.             self.__outputBuffer += data
  160.  
  161.         if self.__noOutput is True:
  162.             self.__outputBuffer = ''
  163.             return
  164.  
  165.         while True:
  166.             try:
  167.                 self.__transferClient.getFile(self.__share, self.__output, output_callback)
  168.                 break
  169.             except Exception, e:
  170.                 if str(e).find('STATUS_SHARING_VIOLATION') >=0:
  171.                     # Output not finished, let's wait
  172.                     time.sleep(1)
  173.                     pass
  174.                 else:
  175.                     #print str(e)
  176.                     pass
  177.         self.__transferClient.deleteFile(self.__share, self.__output)
  178.  
  179.     def execute_remote(self, data):
  180.         command = self.__shell + data
  181.         if self.__noOutput is False:
  182.             command += ' 1> ' + '\\\\127.0.0.1\\%s' % self.__share + self.__output  + ' 2>&1'
  183.         obj = self.__win32Process.Create(command, self.__pwd, None)
  184.         self.get_output()
  185.  
  186.     def send_data(self, data):
  187.         self.execute_remote(data)
  188.         print self.__outputBuffer
  189.         self.__outputBuffer = ''
  190.  
  191.  
  192. # Process command-line arguments.
  193. if __name__ == '__main__':
  194.     print version.BANNER
  195.  
  196.     parser = argparse.ArgumentParser()
  197.  
  198.     parser.add_argument('target', action='store', help='[domain/][username[:password]@]<address>')
  199.     parser.add_argument('-share', action='store', default = 'ADMIN$', help='share where the output will be grabbed from (default ADMIN$)')
  200.     parser.add_argument('-nooutput', action='store_true', default = False, help='whether or not to print the output (no SMB connection created)')
  201.  
  202.     parser.add_argument('command', nargs='*', default = ' ', help='command to execute at the target. If empty it will launch a semi-interactive shell')
  203.  
  204.     group = parser.add_argument_group('authentication')
  205.  
  206.     group.add_argument('-hashes', action="store", metavar = "LMHASH:NTHASH", help='NTLM hashes, format is LMHASH:NTHASH')
  207.  
  208.     if len(sys.argv)==1:
  209.         parser.print_help()
  210.         sys.exit(1)
  211.  
  212.     options = parser.parse_args()
  213.  
  214.     if ' '.join(options.command) == ' ' and options.nooutput is True:
  215.         print "ERROR: -nooutput switch and interactive shell not supported"
  216.         sys.exit(1)
  217.    
  218.  
  219.     import re
  220.     domain, username, password, address = re.compile('(?:(?:([^/@:]*)/)?([^@:]*)(?::([^@]*))?@)?(.*)').match(options.target).groups('')
  221.  
  222.     try:
  223.         if domain is None:
  224.             domain = ''
  225.  
  226.         if password == '' and username != '' and options.hashes is None:
  227.             from getpass import getpass
  228.             password = getpass("Password:")
  229.  
  230.         executer = WMIEXEC(' '.join(options.command), username, password, domain, options.hashes, options.share, options.nooutput)
  231.         executer.run(address)
  232.     except (Exception, KeyboardInterrupt), e:
  233.         #import traceback
  234.         #print traceback.print_exc()
  235.         print '\nERROR: %s' % e
  236.     sys.exit(0)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement