-
Notifications
You must be signed in to change notification settings - Fork 0
Set of tools to analyze and attack Windows sandboxes.
License
1orenz0/sandbox-attacksurface-analysis-tools
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
sandbox-attacksurface-analysis-tools (c) Google Inc. 2015, 2016, 2017, 2018 Developed by James Forshaw This is a small suite of tools to test various properties of sandboxes on Windows. Many of the checking tools take a -p flag which is used to specify the PID of a sandboxed process. The tool will impersonate the token of that process and determine what access is allowed from that location. Also it's recommended to run these tools as an administrator or local system to ensure the system can be appropriately enumerated. CheckExeManifest: Check for specific executable manifest flags. CheckNetworkAccess: Check access to network stack. NewProcessFromToken: Create a new process based on existing token. TokenView: View and manipulate various process token values. NtApiDotNet: A basic managed library to access NT system calls and objects. NtObjectManager: A powershell module which uses NtApiDotNet to expose the NT object manager. ViewSecurityDescriptor: View the security descriptor from an SDDL string or an inherited object. The tools can be built with Visual Studio 2017. It's possible to also build NtApiDotNet and NtObjectManager with .NET Core 2.0 by building the specific project files. Release Notes: 1.1.16 ------ * Added Get-NtFilePathType function. * Added Add-NtSecurityDescriptorDaclAce function. * Added Path support to Get-NtSecurityDescriptor and Set-NtSecurityDescriptor. * Added parameter to only return a specific set of IIDs from a COM proxy definition. * Added support for extracting RPC servers from a DLL. * Added support for enumerating registered RPC endpoints with Get-RpcEndpoint. * Added support for enumerating running service information with Get-RunningService. * Added Get-NtAlpcServer function. * Reworked OpenWithType to support bruteforce of the object type. * Added Win32Utils method to parse command line and extract image path. * Fix DepStatus On Windows Server 2K12 / 2K16 from Rosalie. * Added option to Get-NtProcess and Get-NtThread to only return system information. * Added basic transaction support to registry keys. 1.1.15 ------ * Convert access exceptions during NDR parsing into an NdrParser exception rather than crashing the process. * Added function to enumerate running services with PIDs. * Added methods to load module into a symbol resolver after creation. * Added basic support for WNF registrations including a Get-NtWnf cmdlet. * Expose all parameters for section mapping. * Added a Get-NtMappedSection cmdlet. * Various fixes to NDR decoding. * Added method to create an anonymous named pipe pair. * Rework of cached signing level, including unpacked EA data based on information provided by Alex Ionescu. * Added protection level to the base New-Win32Process function. * Added access rights for process creation. 1.1.14 ------ * Added basic support for transaction objects. * Minor fixes for ALPC support. * Implemented OOP NDR parsing. * Added NDR parsing and formatting powershell functions such as New-NdrParser and Format-NdrComProxy * Fix for display of NDR arrays from 1orenz0. * Print NDR correlation descriptors during formatting. * Added support to read out COM proxies. 1.1.13 ------ * Fixed bug in Get-NtToken for sandboxed tokens. * Extended support for Job objects. * Added Set-NtFileReparsePoint cmdlet. * Added support for viewing a file with Show-NtSection * Added support for DuplicateTo methods from rosalie.lecart. * Improved support for Win32 Desktop and WindowStation objects. * ScriptBlock support for the $_ argument. * Added SID -> Name cache to improve performance. * Fixed user marshallers in NDR for Windows 7. * Added internal security descriptor viewer control. 1.1.12 ------ * Added basic NDR parser. * Added basic symbol resolver. * Added method to read a security descriptor from another process. * Improved process memory read and writing methods. * Added virtual memory cmdlets to allocate, release and modify memory. * Added Get-EmbeddedAuthenticodeSignature function. * Added Get and Set NtSecurityDescriptor functions. * Added ProcessTrustLabel to basic security information set. * Added Get-NtFileChild cmdlet. * Added Get-NtKeyChild cmdlet. * Added Get-NtDirectoryChild cmdlet. * Added name lookup to NtIoControlCode. * Added NtNamedPipeFile type with implementations of basic pipe functions. * Added ADd-DosDevice and Remove-DosDevice cmdlets. * Added file directory and stream visitors. * Merged Get-NtLowBoxToken and Get-NtFilteredToken into Get-NtToken. * Modified Show-NtSection to also display an arbitrary byte array. * Added an Invoke-NtToken cmdlet to run a script block under impersonation. * Added Remove-NtFile cmdlet. * Added case sensitive property for RS4. * Added flags for NtCreateDirectoryObjectEx. * Added pseudo option to Get-NtToken. * Improved conditional ACE support. 1.1.11 ------ * Improved New-NtToken including adding missing IL * Added new NTSTATUS codes from 1709 * Changes to native process creation * Added OverrideChildProcessCreation for Win32 process * Added display of process trust labels from tokens. * Fixed IsChildProcessRestricted on 1709 and above (changed structure) * Fixed named pipe server in TokenViewer * Added -All parameter to Show-NtToken to display list of tokens. 1.1.10 ------ * Added support for extended handle information to allow for PIDs > 64k. * Added basic New-NtToken cmdlet and system call. * Added Resolve-NtObjectAdddress cmdlet to resolve the addresses of a list of objects. * Added generic object ReOpen method. * Added vistor method to object directories to enumerate recursively with a callback. * Added display of process trust labels. 1.1.9 ----- * Fix for bug when querying extended process information on Windows 7/8. * Add OneDrive file attributes from thierry.franzetti. * Added support for displaying child AppContainer names. * Various improvements to section editor including integer data inspectors. 1.1.8 ----- * Better support for relative paths in the cmdlets including supporting ones based on the current directory. * RenameEx and DispositionEx support from fllombard. * Added Key value deletion and fixes from rsiestrunck. * Fixed bug in NtOpenSession prototype. * Added support for adding additional groups to a token in Get-NtToken if user has SeTcbPrivilege. * Added Show-NtToken to display a token in the GUI, renamed old whois style token viewer to Show-NtTokenEffective. * Added PowerShell functions to get and create execution alias reparse points. * Added section viewer and editor with Show-NtSection function. 1.1.7 ----- * Added projects to build NtObjectManager for PowerShell Core 6.0 * Added additional techniques to open process tokens in access checking cmdlets. * Fixed issues with Add-NtKey and added Remove-NtKey cmdlets. * Minor fixes from fllombard * Added change notify key with asynchronous support * Added kernel LUID allocation 1.1.6 ----- * Added support for child process policy and desktop app policy to Win32ProcessConfig. * Added new mitigation options from Win10 1709. * Fix a couple of crashes. 1.1.5 ----- * Fixed crash on 32 bit Windows when enumerating NT types. * Merged ManagedHandleUtils assembly into main NtApiDotNet under the Win32 namespace. 1.1.4 ----- * Added Show-NtSecurityDescriptor function. * Added support for modifying security descriptors in the UI. * Cleanup of access mask when being displayed in the UI. * Added opaque reparse buffer. 1.1.3 ----- * Added Show-NtToken function. * Added basic version checking for certain functions which can't be accessed on Windows 7. * Fixed referenced System.Management.Automation assembly version to run properly with no PS2. * Fixed some bugs in token structures which preventing being used with multiple values. * Added support to Win32Process for LPAC. 1.1.2 ----- * Added Get-AccessibleHandle cmdlet. * Support for oplock levels. * Added support to set inherit and protect on close flags to objects. * Added Get-NtFilePath function. 1.1.1 ----- * Fix to native protected process creation. * Added functions to create native NT processes. 1.1.0 ----- * Removed check tools, excluding CheckNetworkAccess. * Added basic Job object cmdlets. * Added creation of protected processes in Win32Process. * Added service access checking cmdlet. * Added get executable manifest cmdlet. 1.0.9 ----- * Made New-Win32Process more generic and added support for Win32k filter enable. * Added function to capture token from a process using impersonation. * Added basic support for Desktop and WindowStation objects using Win32u.dll exports. * Added file locking implementation including async. * Added hardlink enumeration. * Added NTFS stream enumeration. * Deprecated most of the old standalone utilities in favour of PS cmdlets. 1.0.8 ----- * Added cmdlets to create a kernel memory dump, system environment and licensing. * Additional system calls implemented. * Added access to secure boot policies and code integrity policies. * Made Win32 Process creation more generic and added cmdlet. * Added access check by type including SELF SID. 1.0.7 ----- * Added new cmdlets to do access checking. Many of the old standalone utilities are now deprecated. * Added cmdlets to create lowbox tokens * Added list of known capability SIDs and resolve them during name lookup * Added cmdlet to get a SID * Added cmdlet to do a standalone access checking * Reworked the APIs to include non-throwing versions of many of the core Open/Create methods. * Made NtType more inspectable, includes access enumeration and rationalizes the opening methods. * Various additional properties such as extended process flags, checking for LPAC * Rework of access mask handling. Now all low-level APIs use an AccessMask structure which has conversion operators to and from other enumerations. * Various other bug fixes. 1.0.6 ----- * Added cmdlet to filter a Token object. * Cleanups to various components to make them easier to use from PS 1.0.5 ----- * Added additional Known SIDs * Unified the variant Get-NtToken* cmdlets into one. * Added additional token cmdlets such as Logon and Clipboard. * Added initial support for IO Completion Ports * Added object creation time property * Added support to set a process device map * Added top level CanSynchronize property to NtObject * Bugs fixes from Rustam Agametov * Made process list in token viewer a list rather than a tree and made a separate handle tab. 1.0.4 ----- * Support getting and setting file EA buffer * Added cmdlet to get NTSTATUS code information * Support to toggle UIAccess and Virtualization flags on tokens * Added asynchronous support for file operations using Task APIs * Added support for virtual memory functions * Added cmdlet to create named pipes and mailslots. * Added support for specifying SD as SDDL directly to cmdlets. * Added thread descriptions for Anniversary edition and above. 1.0.3 ----- * Fixed small bug in handling of IO_STATUS_BLOCK which could result in memory corruption. * Added support to list directory entries for a file directory. * Added support to do basic read and writes to a file. 1.0.2 ----- * Added support to disable dynamic code policy on a process. * Added cmdlets for reparse points. * Fixes for EA buffer. * Added service SIDs. * Added support for removing token privileges. * Fixed token security attribute parsing. v1.0.1 ------ * Replaced all unmanaged code with a managed library. * Added NtObjectManager Powershell Module v1.0.0 ------ * Initial Release
About
Set of tools to analyze and attack Windows sandboxes.
Resources
License
Stars
Watchers
Forks
Packages 0
No packages published
Languages
- C# 95.9%
- PowerShell 4.1%