• We just launched and are currently in beta. Join us as we build and grow the community.

PowerSharpPack – Offensive CSharp Project Tool

komoterdon1

Malware Reverse Engineer
K Rep
0
0
0
Rep
0
K Vouches
0
0
0
Vouches
0
Posts
55
Likes
50
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Black-and-Purple-Geometric-Designer-Services-Marketing-Presentation.png


Hey Folks, Most of the time we find offensive tools on github separately that take much time, hence we come back with an interesting tool called “PowerSharpPack” which has Offensive CSharp Projects that can help for the red teaming or offensive security purposes. As we know the most recent innovative security projects or tools are written in C# language and it compiles all projects into one tool such as :

  • Seatbelt
  • SharpUp
  • winPEAS
  • Lockless
  • SharpChromium

All projects work separately and this tool is designed for PowerShell because all the project are wrapped into powershell because of easy usage.

Lets take a look 🙂 !!

Installation

This project is open source that available on the github page. We do not need to download or configure the collection of projects differently, just we will using the below command which will download the “.ps1” extension file from the github page and configured it automatically.

iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S...Sh1t/PowerSharpPack/master/PowerSharpPack.ps1')

1-18.png


After successfully executing the above command we can use this tool by entering the name on the terminal.

PowerSharpPack1PowerSharpPack

2-19.png


As we have already mentioned that this tool contains a collection of projects that we cannot perform separately, so in this tutorial we will show you some examples, after which you will connect with this tool and do itself. In addition, we have mentioned all the projects through the image that are in it.

3-20.png


Read More …

4-19.png


We can investigate the use and function of these all tools by going separately.

Usage

We have mentioned the full usage guide of this tool through an image to which we can add our module and execute its command.

4-ke-baad.png

SauronEye

It is a search tool designed for Red Teamers to find hidden directories, drives, files with specific keywords. There are many such tools available, but they take longer to scan disk files and give us details. But we don’t need to configure it, just we have to execute the below command. As you can see the result it gives us all the directories and files because we did not add any filter.

PowerSharpPack -SauronEye1PowerSharpPack-SauronEye

5-16.png

SharpView

This module can be helpful to identify the available method by which we can get information about the domain and also related to it. But we do not need to do this, just we will execute the below command and it will display all the methods and from which we can further processing.

PowerSharpPack -Sharpview1PowerSharpPack-Sharpview

6-16.png

WinPEAS

This project is specifically designed to explore a possible privilege escalation path in a Windows environment. It will take few seconds to execute almost all the checks and some seconds/minutes during the lasts checks searching for known filenames that could contain passwords. We will execute the following command.

PowerSharpPack -winPEAS1PowerSharpPack-winPEAS

7-15.png

Registry

Here you can see that it is trying to lookup the registry services in which we can easily modify.

8-12.png

Autorun Binaries

A window operating system contains autorum.exe that is designed to automatically run a program from a CD-ROM, as you can see below it tries to find autorun binaries from which we can create a persistence service.

9-12.png

Network Information

Here we can get some useful information like drive access and network configuration and based on which we can take our next step.

10-11.png

Firewall and DNS

Of all the information, this can be useful information for us. If we know about firewall rules then we can easily break the security of the system.

11-10.png

Listening Ports

Here you can see that all the listening address and service which is restricted from outside.

12-10.png


This is not enough because it gives us a lot of information and we cannot show you everything but we hope you have got an idea of how important and useful this tool is.

About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

422,212

310,551

310,560

Top