/LSTAR-EN

LSTAR - CobaltStrike Translated to EN

Primary LanguagePowerShell

LSTAR - Aggressor Translated to English! By Google Translate and Deepl

For the purpose of simplifying CS right-click and facilitating self-integration, refer to a large number of post-infiltration plugins

Refactored and enriched host-related credential acquisition, multi-level intranet penetration, hidden scheduled tasks, anti-kill Mimikatz and cloning to add users and other functions

Features:

  • By cooperating with CobaltStrike's TCP, SMB, Proxy, etc., to penetrate the complex network environment
  • Provide multiple anti-kill execution methods for RDP-related, AddUser, LsassDump and other functions to deal with unpopular environments
  • **Integrate multiple anti-kill functions such as shadow users running in WinAPI or Assembly memory loading mode, hidden scheduled tasks, etc. **

Among others include the following functional modules:

image The rest of the pics below are unchanged!

Each module is added with a green dividing line before running to facilitate positioning and display information and improve collaboration efficiency

image-20211016170807973

CobaltStrike Host Launches Wechat Notification Plugin:

Disclaimer

This project is only applicable to security research and legal enterprise security construction. All consequences and responsibilities shall be borne by the user

2022.1.15 update

  • Add anti-kill clone user, add user, scheduled task function
  • Get the latest sunflower identification code and verification code
  • Integrated Ladon 9.1.1 version multi-protocol survival detection and other functions
  • Categorize the functions to simplify the secondary menu of the plugin

InfoCollect

Common commands are classified according to the scene

image-20220114101130300

SharpGetInfo

Integrated Ladon public latest version 9.1.1

image-20211229102143317

AntiVirusCheck

Antisoft information locally echoes Beacon status bar

Implementation principle: https://blog.csdn.net/weixin_42282189/article/details/121090055

image-20220112150926351

IntrScan

Added Ladon's multi-protocol liveness detection (SMB, WMI, SNMP, HTTP, DNS, MAC, MSSQL)

Intranet assets behind the firewall can be detected to a certain extent:Use MAC to bypass the firewall to detect surviving hosts

image-20211229171305053

Live IP detection

image-20211229171224738

AuthPromote

BadPotato (BeichenDream)

Fixed the bug that can only execute whoami, you can run the online System permission through parameters

image-20220113165021408

image-20220113165229359

Badpotato (Ladon)

Added Ladon's Badpotato

image-20211229104134559

Sweet Potato (Ladon)

image-20211229104432695

Note: The test found that the above two privilege escalation behaviors will be intercepted and killed by digital antivirus

image-20211229103727123

##AuthMaintain

SharpSchTask

**[Use with caution] Utilize Windows API to create hidden scheduled tasks with tools, and bypass the blocking of security software to achieve persistent control. **

Project address: https://github.com/0x727/SchTask_0x727

image-20220114100528645

SharpShadowUser

【Use with caution】Bypass remote memory loading clone hidden shadow users

Project address: https://github.com/An0nySec/ShadowUser

image-20220115175808998

EasyPersistent

Fix the PE file path problem, you can use the API method to delete the added user

image-20220115182612757

PassCapture

Categorize the functions according to the scene

image-20220115172016468

SunFlower

Get the latest sunflower identification code and verification code

The base_encry_pwd parameter of the latest version of Sunflower has been changed from config.ini to the registry

image-20220115173453909

RemoteLogin

Simplified secondary menu

image-20220115183414339

BypassCXK

SharpAddUser

Bypass AV utilizes the DirectoryService namespace to add users to the Administrators and Remote Desktop groups

Project address: https://github.com/An0nySec/UserAdd

image-20220113152442668

CloneX

A security detection tool for adding users and cloning users under the command line

Project address: https://github.com/0x727/CloneX_0x727

image-20220113155017688

2021.10.18 update

  • Reintegrated and optimized the overall functional modules
  • Lateral movement module adds BOF implementation of ZeroLogon vulnerability
  • Added some Assembly methods to run without file landing functions

InfoCollect

SharpGetInfo (one-click collection of host information)

Using Ladon for one-click collection includes host basic information, network information, user information, process information, whether it is in the domain, etc.

image-20211018111745511

SharpListRDP (RDP record query)

Collect RDP internal and external connection records, convenient for locating the operation and maintenance machine and lateral movement

image-20211016174456005

IntrScan

Cube (modular detection)

Cube is added to replace the blasting of the old version. It also supports intranet information collection and MSSQL command execution. For detailed usage, refer to the operation instructions

image-20211015174007171

Allin (Assisted Flexible Scanning)

Added Allin to assist flexible scanning, take remote acquisition of network card IP as an example:

image-20211015173332706

SharpOXID-Find (OXID detection)

Or when you don’t want to land on EXE, you can use the Assembly method to quickly detect OXID

image-20211018112045735

IntrAgent

Stowaway (through multi-level intranet)

Run after uploading the agent

image-20211012100041529

The admin side can build a Socks5 tunnel after receiving the connection

image-20211011203216542

Delete agent

image-20211012094116014

PassCapture

LsassDump(WinAPI)

Modify the operation mode of LsassDump and delete the dumped C:\Windows\Temp\1.dmp while deleting LsassDump

image-20211016174730994

Mimidump (remote read .dmp)

** Added LsassDump (WinAPI) function to remotely read C:\Windows\Temp\1.tmp (.net 4.5) dumped by the target machine**

image-20211015094927257

RemoteLogin

** Added the method of using Powershell to open and close and query RDP related information **

image-20211018113058495

The PS script comes from the Black Devil plug-in RDP module in Reference

Query RDP status

image-20211015150247382

Start the RDP service

image-20211015150320880

Get RDP port

image-20211015150713858

View RDP historical login credentials

image-20211015150429336

Get RDP historical login credentials

image-20211015150502487

LateMovement

IPC connection

image-20211018105021131

Ticket passing

image-20211016173510988

ZeroLogonBOF

Added BOF implementation of ZeroLogon vulnerability

Reference: https://github.com/rsmudge/ZeroLogon-BOF

image-20211014143141276

2021.09.05 update

  • Adapted to x86 architecture machines for some functions
  • Added some anti-virus gadgets using WindowsAPI
  • Intranet scanning module adds parameter prompt output when running the corresponding function

IntrScan

Fscan

Added to upload the corresponding EXE file according to the target machine architecture

image-20210905154601537

Added parameter prompt output to facilitate targeted and specified operation of a single module

image-20210905161338995

Crack

Add Crack intranet blasting tool

image-20210905161656828

TailorScan

Added to upload the corresponding EXE file according to the target machine architecture

image-20210905160326319

PassCapture

LaZagne

Fixed LaZagne not finished running due to network problems in version V1.2

The bug of killing the process and deleting the landing file is switched to manual operation

image-20210904175955070

LsassDump

Added LsassDump for memory dump using Windows API and supports x86 and x64 machines

image-20210904180546301

The 1.dmp generated after the dump is successful will be saved in the C:\Windows\Temp\ directory

image-20211015093809697

You can directly read it locally:

image-20210904183721654

LateMovement

Added RDP related functions:

image-20210905215527815

Use WindowsAPI to start the RDP service

image-20210905215709267

2021.08.12 update

InfoCollect

Added CheckVM to detect whether the target is a virtual machine

20210808_2213

AVSearch

Because the previous script has a certain probability of failure:

image-20210808222325403

Updated the new way to detect and kill software

image-20210808221945724

AuthPromote

Fixed the BUG of the previous rights escalation module

image-20210811105401723

##AuthMaintain

EasyPersistent:https://github.com/yanghaoi/CobaltStrike_CNA

Added a Cobalt Strike CNA script for privilege maintenance on Windows

Using the reflection DLL module to visualize the common permission maintenance methods such as system services and scheduled tasks through the API is very easy to use. (Author's original words)

image-20210812170907609

Documentation: https://github.com/yanghaoi/CobaltStrike_CNA/blob/main/EasyCNA/README.md

image-20210812170946202

PassCapture

Mimikatz related

image-20210811104834675

Lazagne

Practice test is relatively easy to use to retrieve the host password tool (exe file will be automatically deleted after uploading and running)

image-20210811102145547

Browser Password

image-20210811105159479

Navicat Xshell and other native software

image-20210811105105056

FakeTheScreen

Optimized different phishing password stealing for Windows 10 and Windows 7

image-20210811095234252

Because the effect of the fake page is hard to describe, it is only recommended to use it when you are ready to die:

image-20210811094621414

Reference

梼杌 - taowu-cobalt-strike

Z1-AggressorScripts

Self-opening-csplugin

EasyPersistent Windows permission maintenance

Black Devil-CSplugins

InfoCollect

Added Netview and Powerview features

image-20210707112534352

AvSearch

Process query through Wmic

image-20210707114047098

image-20210706105117525

IntrScan

Including all kinds of intranet health care

image-20210707112718120

Custom command to run

image-20210706110153336

fscan uploads to C:\\Windows\\Temp\\ by default

image-20210706110110475

CONSOLE RETURN

image-20210706110008931

Delete fscan and result text

image-20210706110809988

IntrAgent

It is a relatively easy-to-use intranet penetration tool and has no configuration files to reduce the risk of being traced

image-20210707112750687

#AuthMaintenance

Added silver note and gold note on the basis of 梼杌

image-20210707112856320

LateMovement

Contains lateral movement kits such as sharpwmi based on port 135

image-20210707113642982

TraceClean

Clean up the traces of Stitching IX to be perfected

image-20210707113717904

BypassCxk

cxk limited-time kill-free version adduser and mimikatz

image-20210707113737475

HavingFun

Picture a joy in the days of making a website

image-20210707113749756