portia: Privilege escalation tool

Privilege escalation tool

portia

Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised

  • Privilege escalation
  • Lateral movement
  • Convenience modules

Portia is a genus of jumping spider that feeds on other spiders – known for their intelligent hunting behavior and problem-solving capabilities usually only found in larger animals

A new functionality has been added. The new script is ‘hopandhack.py’.
The new script ‘hopandhack‘ can be used by attackers to automatic find and hunt hosts that are not directly accessible from the attacker’s machine. In some organizations, IT administrators have to use something called a ‘jump box’ or VPN to access the secure data center or PCI network where sensitive data are stored.

The ‘hopandhack’ script automates the process of finding hosts with the necessary routes to these secure network and compromises them. The functionality of hopandhack will be incorporated into Portia in the next week or so.
More details about the hopandhack script can be found at https://milo2012.wordpress.com/2017/09/21/jumping-from-corporate-to-compromising-semi-isolated-network/

Installation

Dependencies


pip install pysmb tabulate termcolor xmltodict impacket

apt install autoconf automake autopoint libtool pkg-config
mkdir /pentest
cd/pentest
git clone https://github.com/libyal/libesedb.git
cd libesedb
./synclibs.sh
./autogen.sh
cd /pentest
git clone https://github.com/csababarta/ntdsxtract
cd ntdsxtract
python setup.py install
sudo pip install git+https://github.com/pymssql/pymssql.git

Installation

git clone https://github.com/SpiderLabs/portia.git
cd portia
chmod +x install.sh
./install.sh
python portia.py

 

How Portia Works

                        #7 Use Impersonation Token

+------Run Mimikatz on DC---------------+ +---------------------------------------------------------+
| Dump Password Hashes from DC | | |
| | | |
+------------+ | +-------------+ +--v---v-----+ |
|Workstation | | | Workstation | | Domain | #3 Checks if Account |
|(Workgroup) | | | (Domain) | | Controller | <------is in Domain Admin Group |
++---+-------+ | +-+----+------+ +------+-----+ | |
^ ^ | ^ ^ ^ | |
| | | | | | | |
| | | | | #4 Check SYSVOL #2 Enumerate Users |
| | | | | for Passwords in Domain Admin Group |
| |#6 Checks for | #5 Checks if account | | |
| |Impersonation | has admin rights +-------+------+ | |
| +Tokens--------------on host-------------------+ Hacker +-------#1 Checks----------+ |
| | +----+---+-----+ credentials |
| | | | |
| | | | |
| | | | |
| #8 Use New Hashes / Passwords | +--------------------------------------------------------+
+-----------to Compromise Other Hosts-------------------+

 

Copyright 2017 invalid-email-address

Source: https://github.com/SpiderLabs/