Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/phrozenio/powerrunassystem

PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate the NT AUTHORITY/SYSTEM user and execute commands or launch interactive processes without relying on third-party tools. It achieves this using only native Windows build-in features.
https://github.com/phrozenio/powerrunassystem

interactive nt powershell process system windows

Last synced: 6 days ago
JSON representation

PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate the NT AUTHORITY/SYSTEM user and execute commands or launch interactive processes without relying on third-party tools. It achieves this using only native Windows build-in features.

Awesome Lists containing this project

README

        

**PowerRunAsSystem** is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate the **NT AUTHORITY/SYSTEM** user and execute commands or launch interactive processes without relying on third-party tools. It achieves this using only native Windows build-in features.

Traditionally, elevating privileges to the SYSTEM user from an administrator account requires using tools like [PsExec from Sysinternals](https://learn.microsoft.com/en-us/sysinternals/downloads/psexec) or creating a custom service. With PowerRunAsSystem, you can accomplish the same goal using the built-in Windows Task Scheduler, eliminating the need for external utilities.

This tool allows you to:

* Impersonate the SYSTEM user in the current terminal session
* Run non-interactive commands as SYSTEM
* Launch a new interactive process as SYSTEM (tied to the active terminal session)

In cases where graphical access to the machine is unavailable, you can redirect the input/output of the spawned SYSTEM process to a listener (e.g., a Netcat listener) for interaction.

> It’s important to note that administrative privileges are required to spawn a SYSTEM process in a standard configuration. Ensure that you either access a remote terminal (e.g., SSH or WinRM) with administrative rights or open a new terminal with elevated privileges (Run as Administrator).

## Exported Functions

* `Invoke-SystemCommand`
* `Invoke-InteractiveSystemProcess`
* `Invoke-ImpersonateSystem`
* `Invoke-RevertToSelf`

## Installation

### PowerShell Gallery (Recommended)

The following commands for the installation process may require privileges (e.g., Administrative rights, appropriate Execution Policy settings). Ensure that you understand and meet these requirements before proceeding.

```powershell
Install-Module -Name PowerRunAsSystem
Import-Module -Name PowerRunAsSystem
```

### Importing as a Script

```powershell
IEX(Get-Content .\PowerRunAsSystem.ps1 -Raw -Encoding UTF8)
```

## Usage

### `Invoke-SystemCommand`

Spawn a new process as the SYSTEM user via Task Scheduler. Note that the SYSTEM process will not be tied to the active terminal session, meaning it won’t be interactive. This is useful for quickly running commands as SYSTEM without needing direct interaction with the process.

#### ⚙️ Available Arguments

| Parameter | Type | Default | Description |
|-------------------------|------------------|------------------------------------------------|----------------------------|
| Application | String | powershell.exe | Program to execute |
| Argument | String | -Command "whoami \| Out-File C:\result.txt" | Optional program arguments |

### `Invoke-InteractiveSystemProcess`

Spawn a new interactive process as the SYSTEM user, which will be tied to the active terminal session and, if selected, visible on the current desktop.

This can be particularly useful in scenarios where an interactive SYSTEM process is needed. For instance, when using [Arcane Server](https://github.com/PhrozenIO/ArcaneServer), running it as an interactive SYSTEM process allows you to capture both the desktop and LogonUI/UAC prompts.

![Interactive System Process](images/InteractiveSystem.png)

#### ⚙️ Available Arguments

| Parameter | Type | Default | Description |
|-------------------------|------------------|------------------------------------------------|------------------------------------------------------------------------------------------------|
| CommandLine | String | powershell.exe | The complete command line to execute. |
| Hide | Switch | None | If present, the process is not visible. |
| RedirectKind | Choice | None | If the process input/output needs to be redirected to an external source (as discussed below)… |
| Address | String | None | Used if the **RedirectKind** is set (as described below). |
| Port | Int (R: 0-65535) | None | Used if the **RedirectKind** is set (as described below). |

#### Advanced Usage : RedirectKind Flag

##### `None` (Default)

No specific redirection is used; the process is spawned normally. To interact with the process, you must do so through the desktop.

If RedirectKind Flag is specified, the `stdout`, `stderr`, and `stdin` of the process are redirected to a network socket. This setup enables interaction with the spawned process without requiring access to the desktop, which is particularly useful when the process is initiated from an SSH or WinRM session.

#### `Bind`

Spawn your interactive SYSTEM process:

````powershell
Invoke-InteractiveSystemProcess -RedirectKind "Bind" -Address "0.0.0.0" -Port 4444
````

In the context of a bind shell, the address specifies the network interface to bind to. Using `0.0.0.0` means the shell will listen on all available network interfaces, while `127.0.0.1` restricts it to the loopback interface, making it accessible only from the local machine.

Then, with netcat, connect to listener:

`````bash
nc 127.0.0.1 4444
`````

In the context of a bind shell, it is important to note that the temporary SYSTEM process acting as the **launcher** will remain in a hanging state until a client connects to the listener. Only one client can connect to the listener, only once. Once connected, an interactive SYSTEM process will be established. When the session/process, both the client and listener will be released, marking the termination of the **launcher**.

##### `Reverse`

Create a new Netcat listener (adapt the command according to your operating system and version of Netcat):
````bash
nc -l 4444
````

Then, spawn your interactive SYSTEM process:

````powershell
Invoke-InteractiveSystemProcess -RedirectKind "Reverse" -Address "127.0.0.1" -Port 4444
````

In the context of a reverse shell, it is important to note that a listener must be started before executing the reverse shell command. If the listener is not active, the attempt to spawn an interactive SYSTEM process will fail.

Enjoy your SYSTEM shell 🐚

![Reverse Interactive SYSTEM Shell](images/ReverseInteractive.png)

### `Invoke-ImpersonateSystem`

Impersonate the SYSTEM user within the current terminal session.

![RevertToSelf](images/ImpersonateSystem.png)

### `Invoke-RevertToSelf`

Stop user impersonation

![RevertToSelf](images/RevertToSelf.png)