Skip to content

nanoby7e/pen-300-scripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 

Repository files navigation

A collection of simple scripts written through the OffSec's PEN300 course for public consumption.

Footholder - Basic Windows Enum Script

This script performs the basic situational awareness checks for Windows machines:

  1. Print to console the current domain
  2. Print to console the current domain logon servers
  3. Print to console the system information
  4. Check if Defender is installed, and any other installed antivirus products
  5. Check who you are, with whoami /all
  6. Check if you are a local administrator on the box
  7. Print to console the local administrator group
  8. Print to console the attached network adapters, to find if you are dual homed
  9. Print to console network configuration
  10. Prints to console open ports and services
  11. Print to console any PowerShell history
  12. Print to console contents of C:\ drive
  13. Check for any connected shared drives
  14. Check for AppLocker Policies
  15. Print to console installed software (32 bit and 64 bit, categorized)
  16. Print to console "Program Files" and "Program Files (x86)" to check for anything interesting within those directories.
  17. PrivEsc - Check for any unquoted service paths
  18. PrivEsc - Check for AlwaysInstalledElevated
  19. Check for interesting files in C:\Users
  20. Check for any .ssh directories in C:\Users\<USERNAME>\.ssh a. If the directory exists, print to console SSH Keys, RSA Leys, Public Keys, authorized_keys
  21. Check for flags (local.txt, proof.txt, ssecret.txt) a. If found, prints to console, with a reminder for commands:
    whoami
    hostname
    ipconfig
    Type C:\Users\Path\To\Flag.txt
  22. Checks for other intersting files on disk a. Excludes C:\Users, C:\Windows, C:\PerfLogs
  23. Prints to console Domain Groups
  24. Prints to console Domain Users
  25. Prints to console Domain Group Members (All the domain groups, noisy!)

Bssic OSEP Linux Enum

This script performs (you guessed it) basic enumeration tasks on a Linux machine:

  1. Checks for ansible
  2. Checks for ansible hosts
  3. Locates ansible playbooks
  4. Checks for passwords in various log file locations
  5. Checks if jfrog is installed
  6. Checks for jfrog artifactory and console logs
  7. Checks for access.backup
  8. Checks for ssh key files
  9. Checks for ssh_config files that contain ControlMaster or ControlPath
  10. Checks for any socket files
  11. Checks for running processes with SSH_AUTH_SOCK
  12. Checks for .ssh files in /home directories

Venom-Generator

[!] These are not going to bypass defender as is! This just jumpstarts your exam, with vanilla shellcode you must take and encode/encrypt/whatever to bypass defender.

This script will create all your payloads that you used in the course.

[!] Warning!
These were all tested in a homelab, and not inside the course labs! If you're not getting a callback, not my fault.

  1. 32-bit reverse_https and reverse_tcp vbapplication, csharp payloads
  2. 64 bit reverse_https and reverse_https raw, csharp, powershell, vbapplication, exe, dll, elf (no reverse_https, as that payload doesn't exist for ELF) and msi payloads
  3. A lonely, single reverse_tcp_ssl python payload (That I can't recall where it was used in the course, but it's in my notes, so it's in the script)
├── csharp
│   ├── reverse_https-x32-csharp.txt		- TESTED, passed (in homelab)
│   ├── reverse_https-x64-csharp.txt		- TESTED, passed (in homelab)
│   ├── reverse_tcp-x32-csharp.txt		- TESTED, passed (in homelab)
│   └── reverse_tcp-x64-csharp.txt		- TESTED, passed (in homelab)
├── dll
│   ├── reverse_https-x64-dll.dll		- TESTED, passed (in homelab)
│   └── reverse_tcp-x64-dll.dll			- TESTED, passed (in homelab)
├── elf
│   └── reverse_tcp-x64-elf			- TESTED, passed (in homelab)
├── exe
│   ├── reverse_https-x64-exe.exe		- TESTED, passed (in homelab)
│   └── reverse_tcp-x64.exe			- TESTED, passed (in homelab)
├── msi
│   ├── reverse_https-x64-msi.msi		- TESTED, passed (in homelab)
│   └── reverse_tcp-x64-msi.msi			- TESTED, passed (in homelab)
├── powershell
│   ├── reverse_https-x64-ps1.ps1		- TESTED, passed (in homelab)
│   └── reverse_tcp-x64-ps1.ps1			- TESTED, passed (in homelab)
├── raw
│   ├── reverse_https-x64-raw.bin		- TESTED, passed (in homelab)
│   └── reverse_tcp-x64-raw.bin			- TESTED, passed (in homelab)
├── vbapplication
    ├── reverse_https-x32-vpapplication.txt	- TESTED, passed (in homelab)
    ├── reverse_https-x64-vbapplication.txt	- TESTED, passed (in homelab)
    ├── reverse_tcp-x32-vpapplication.txt	- TESTED, passed (in homelab)
    └── reverse_tcp-x64-vbapplication.txt	- TESTED, passed (in homelab)

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •