PowerSploit

PowerSploit is an open source, offensive security framework comprised of PowerShell modules and scripts that perform a wide range of tasks related to penetration testing such as code execution, persistence, bypassing anti-virus, recon, and exfiltration. [1] [2] [3]

ID: S0194
Type: TOOL
Platforms: Windows
Version: 1.6
Created: 18 April 2018
Last Modified: 17 August 2023

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

PowerSploit's Invoke-WmiCommand CodeExecution module uses WMI to execute and retrieve the output from a PowerShell payload.[1][3]

Enterprise T1555 .004 从密码存储中获取凭证: Windows Credential Manager

PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.[1][3]

Enterprise T1005 从本地系统获取数据

PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.[1][3]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.[1][3]

Enterprise T1574 .001 劫持执行流: DLL Search Order Hijacking

PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.[1][3]

.007 劫持执行流: Path Interception by PATH Environment Variable

PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable.[1][3]

.008 劫持执行流: Path Interception by Search Order Hijacking

PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities.[1][3]

.009 劫持执行流: Path Interception by Unquoted Path

PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities.[1][3]

Enterprise T1620 反射性代码加载

PowerSploit reflectively loads a Windows PE file into a process.[1][3]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.[1][3]

.005 启动或登录自动启动执行: Security Support Provider

PowerSploit's Install-SSP Persistence module can be used to establish by installing a SSP DLL.[1][3]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

PowerSploit modules are written in and executed via PowerShell.[1][3]

Enterprise T1482 域信任发现

PowerSploit has modules such as Get-NetDomainTrust and Get-NetForestTrust to enumerate domain and forest trusts.[1][3]

Enterprise T1113 屏幕捕获

PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.[1][3]

Enterprise T1003 .001 操作系统凭证转储: LSASS Memory

PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz.[1][3]

Enterprise T1552 .002 未加密凭证: Credentials in Registry

PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon.[4]

.006 未加密凭证: Group Policy Preferences

PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.[1][3]

Enterprise T1012 查询注册表

PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.[1][3]

Enterprise T1027 .005 混淆文件或信息: Indicator Removal from Tools

PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures.[1][3]

.010 混淆文件或信息: Command Obfuscation

PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.[1][3]

Enterprise T1558 .003 窃取或伪造Kerberos票据: Kerberoasting

PowerSploit's Invoke-Kerberoast module can request service tickets and return crackable ticket hashes.[5][6]

Enterprise T1134 访问令牌操控

PowerSploit's Invoke-TokenManipulation Exfiltration module can be used to manipulate tokens.[1][3]

Enterprise T1087 .001 账号发现: Local Account

PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token.[1][3]

Enterprise T1056 .001 输入捕获: Keylogging

PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes.[1][3]

Enterprise T1057 进程发现

PowerSploit's Get-ProcessTokenPrivilege Privesc-PowerUp module can enumerate privileges for a given process.[1][3]

Enterprise T1055 .001 进程注入: Dynamic-link Library Injection

PowerSploit contains a collection of CodeExecution modules that inject code (DLL, shellcode) into a process.[1][3]

Enterprise T1123 音频捕获

PowerSploit's Get-MicrophoneAudio Exfiltration module can record system microphone audio.[1][3]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job.[1][3]

Groups That Use This Software

Campaigns

ID Name Description
C0004 CostaRicto

During CostaRicto, threat actors used PowerSploit's Invoke-ReflectivePEInjection module.[17]

C0014 Operation Wocao

During Operation Wocao, threat actors used PowerSploit’s Invoke-Kerberoast module to bruteforce passwords and retrieve encrypted service tickets.[18]

References