PowerSploit is an open source, offensive security framework comprised of PowerShell modules and scripts that perform a wide range of tasks related to penetration testing such as code execution, persistence, bypassing anti-virus, recon, and exfiltration. [1] [2] [3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
PowerSploit's |
|
| Enterprise | T1555 | .004 | 从密码存储中获取凭证: Windows Credential Manager |
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.[1][3] |
| Enterprise | T1005 | 从本地系统获取数据 |
PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.[1][3] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.[1][3] |
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.[1][3] |
| .007 | 劫持执行流: Path Interception by PATH Environment Variable |
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable.[1][3] |
||
| .008 | 劫持执行流: Path Interception by Search Order Hijacking |
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities.[1][3] |
||
| .009 | 劫持执行流: Path Interception by Unquoted Path |
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities.[1][3] |
||
| Enterprise | T1620 | 反射性代码加载 |
PowerSploit reflectively loads a Windows PE file into a process.[1][3] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
PowerSploit's |
| .005 | 启动或登录自动启动执行: Security Support Provider |
PowerSploit's |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
PowerSploit modules are written in and executed via PowerShell.[1][3] |
| Enterprise | T1482 | 域信任发现 |
PowerSploit has modules such as |
|
| Enterprise | T1113 | 屏幕捕获 |
PowerSploit's |
|
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz.[1][3] |
| Enterprise | T1552 | .002 | 未加密凭证: Credentials in Registry |
PowerSploit has several modules that search the Windows Registry for stored credentials: |
| .006 | 未加密凭证: Group Policy Preferences |
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.[1][3] |
||
| Enterprise | T1012 | 查询注册表 |
PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.[1][3] |
|
| Enterprise | T1027 | .005 | 混淆文件或信息: Indicator Removal from Tools |
PowerSploit's |
| .010 | 混淆文件或信息: Command Obfuscation |
PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.[1][3] |
||
| Enterprise | T1558 | .003 | 窃取或伪造Kerberos票据: Kerberoasting |
PowerSploit's |
| Enterprise | T1134 | 访问令牌操控 |
PowerSploit's |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
PowerSploit's |
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
PowerSploit's |
| Enterprise | T1057 | 进程发现 |
PowerSploit's |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
PowerSploit contains a collection of CodeExecution modules that inject code (DLL, shellcode) into a process.[1][3] |
| Enterprise | T1123 | 音频捕获 |
PowerSploit's |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
PowerSploit's |
| ID | Name | References |
|---|---|---|
| G0064 | APT33 | |
| G1006 | Earth Lusca | |
| G0096 | APT41 | |
| G0069 | MuddyWater | |
| G0046 | FIN7 | |
| G0045 | menuPass | |
| G0065 | Leviathan | |
| G0092 | TA505 | |
| G0040 | Patchwork |
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used PowerSploit's |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used PowerSploit’s |