aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2022-09-18dev buildsdevkevin121-951/+2230
2021-12-14output fixKevin Robertson1-14/+18
2021-12-14bug fixes, new output levelKevin Robertson5-25/+67
2021-11-30bug fixesKevin Robertson149-604/+18178
2019-07-23latest dev buildKevin Robertson2-404/+447
cleanup
2019-05-05bug fixesKevin Robertson2-18/+19
2019-03-10Added features and tweaksKevin Robertson2-223/+600
Added DNS spoofer. Added GQBL NS bypass for wpad to ADIDNS attacks. HTTP listener improvements.
2019-02-26Merge branch 'dev' of https://github.com/Kevin-Robertson/Inveigh into devKevin Robertson1-1/+1
2019-02-26Kerberos TGT capture added to HTTPKevin Robertson2-310/+389
Both SMB sniffer and the HTTP/HTTPS/Proxy listener can now capture Kerberos TGTs in kirbi format.
2019-02-26Update Inveigh.ps1Kevin Robertson1-3/+3
2019-02-25Added SMB Kerberos TGT capture and kirbi outputKevin Robertson3-52/+635
Added SMB Kerberos TGT capture through packet sniffing and kirbi output. To use, credentials are required for an account with unconstrained delegation. This is still in the early stages. I'm not using an ASN.1 library so there is probably lots that can throw off the parsing.
2019-02-20Bug fixesKevin Robertson1-33/+45
2019-02-14Pcap output, more SMB info, bug fixesKevin Robertson2-155/+348
Added pcap output to either a file or in memory ArrayList. Added more output for SMB authentication activity. Fixed some Inveigh-Relay bugs.
2019-01-30Updated impacket linkKevin Robertson1-1/+1
2019-01-30Kerberos detection and bug fixesKevin Robertson3-27/+74
Added indicator for when SMB auth negotiates to Kerberos. Bug fixes.
2018-09-25Link fixKevin Robertson1-2/+2
2018-09-25Readme updateKevin Robertson1-1/+3
Added Invoke-TheHash link
2018-09-25Dev branch syncKevin Robertson3-804/+1736
2018-09-16Final 1.4 Dev VersionKevin Robertson5-10712/+2086
Added ConvertTo-Inveigh (powershell 3+) for importing BloodHound JSON files for Inveigh Relay. Lots of updates and bug fixes.
2018-07-10Inveigh 1.4 dev updateKevin Robertson3-2359/+2328
Invoke-Inveigh - Added ADIDNS spoofing combo and wildcard attacks. Removed dynamic updates combo attack. Invoke-InveighRelay - Latest revision of the new multi-host targeting system. I haven't yet had a chance to create a tool for importing CSV files from bloodhound. I was able to match up the data formatting though.
2018-05-08More targeting logic and bug fixesKevin Robertson2-134/+354
Added some more targeting logic. Added access denied handling for enumeration.
2018-05-03Inveigh-Relay - Enum output, bug fixesKevin Robertson1-565/+629
Added real time output for the enumerate attack. Added try/catches to the smb relay functions and did a few bug fixes.
2018-05-02Inveigh-Relay and Invoke-SMBEnum group membership updatesKevin Robertson2-19/+65
Added ability to Inveigh-Relay and Invoke-SMBEnum to identify groups vs users when enumerating group memberships.
2018-05-01Inveigh-Relay new attack and targeting systemKevin Robertson5-5180/+6921
Inveigh-Relay 1. Added a new attack mode 'Enumerate'. This attack mode will leverage relayed connections to perform system enumeration. Right now I have local users, local admins, shares, and netsessions. 2. Attacks can now be combined. Session, Enumerate, and Execute can all be enabled at the same time. They will be chained together. 3. New multi-target system to replace the new multi-target system from the last dev update:) Inveigh-Relay will leverage the data gathered through enumeration to make relay target selections. Here's a simplistic example: a. Inveigh-Relay receives and incoming connection from 192.168.1.1 and relays the connection to 192.168.1.2. b. During the NTLM relay, the module records the user (test1) that is relayed from 192.168.1.1. c. The relayed connection is used to enumerate details on 192.168.1.2. The local admin group is found to include the user test2. d. test1 is found to not be privileged on 192.168.1.2. e. Inveigh-Relay receives an incoming connection from 192.168.1.3 and relays the connection to 192.168.1.4. f. During the NTLM relay, the module records the user (test2) that is relayed from 192.168.1.3. g. The relayed connection is used to enumerate details on 192.168.1.4. h. test2 is found to not be privileged on 192.168.1.4. i. Inveigh-Relay receives another connection from 192.168.1.3. j. Since test2 was previously observed on 192.168.1.3 and 192.168.1.2 has test2 in its local admin group, 192.168.1.2 is selected as a relay target. k. test2 is found to be privileged on 192.168.1.2. l. Depending on the attack selection, either a privileged session is established, a command is executed, or both. This is still in a very early stage and not production ready. I need to add a lot more logic to do things like prioritizing systems hosting shares with the session attack, etc. I also need to sort out gathering and importing the enumeration data used for targeting if you already have domain access. This will also open up making matches based on domain group membership. Bloodhound data should also work for targeting. I just need to work out how to match username formats, etc. Most of the enumeration data is stored in $inveigh.enumeration_list. 4. Target parameter will now accept CIDR and IP ranges. Invalid targets (as long as it's not a huge amount) are filtered out as part of the targeting process. 5. I took out SMB1 support. It only worked for command execution and removing it greatly simplifies things. The old version will still work if SMB1 is required. I should be back to regular updates leading up to the release of 1.4. The enumeration code took some time.
2018-03-26Updated Invoke-SMBEnumKevin Robertson1-1003/+2096
2018-03-01Added Invoke-SMBEnumKevin Robertson3-70/+2160
Dev version of Invoke-SMBEnum for performing enum tasks over SMB with PTH and Inveigh-Relay sessions. Right now it just enumerates shares, netsessions, and local users. Also fixed some minor Invoke-SMBClient and Invoke-SMBExec issues.
2018-02-21Session refresh change and bug fixesKevin Robertson1-7/+35
The SMB echo wasn't keeping sessions open on Windows 7. Switched to tree connect/disconnect for now. Output and signing check fix.
2018-02-20Inveigh 1.4 dev bug fixesKevin Robertson4-465/+495
Fixed a lot of bugs with the new Inveigh Relay session attack mode. Tweaked the SMB2 credits in Inveigh-Relay, Invoke-SMBExec, and Invoke-SMBClient to hopefully keep the sessions from erroring out after lots of repeated use. Switched to an SMB2 Echo to keep the sessions active. Fixed some output issues. Multitarget still isn't working correctly.
2018-02-19Inveigh 1.4 devKevin Robertson11-5737/+12399
This is an early version of Inveigh 1.4. There is probably alot that is broken. Inveigh: 1. Invoke-DNSUpdate integration - Inveigh will attempt to inject DNS records if the same LLMNR/NBNS request is observed from multiple systems. The goal is to find requests that could be valid in other subnets and leverage them through DNS. This version requires that Inveigh is running with a domain auth user context. 2. Reworked output system and formating. 3. hmm...I forget. Inveigh Relay: 1. New attack with Invoke-TheHash integration - In addition to that standard psexec style attack, Inveigh Relay now has the ability to create and maintain authenticated priv and unpriv SMB2 sessions. These sessions can be used by Invoke-SMBClient (attack file shares) and Invoke-SMBExec. Invoke-InveighRelay -Attack session -Target 10.10.10.10 wait for relay Get-Inveigh -session Invoke-SMBClient -Session 0 -Source \\10.10.10.10\share 2. Multitarget - Inveigh Relay will now accept an array of targets. As relay attempts come in, Inveigh Relay will attempt to select the best target (still needs work). 3. SMB signing check for targets on startup. 4. Reworked output system and formating. I'm temporarily housing newer versions of Invoke-DNSUpdate, Invoke-SMBClient, and Invoke-SMBExec here. They need to be imported into the same powershell session for integration to work. There is also probably a lot broken with these.
2017-09-25ResponderGuard defenseKevin Robertson3-412/+681
Inveigh will now ignore NBNS/LLMNR requests sent directly to the host IP address rather than the broadcast/multicast address.
2017-04-05small updateKevin Robertson2-2/+2
2017-04-04Last fixesKevin Robertson2-1/+11
2017-04-03bug fixesKevin Robertson2-55/+61
2017-04-02Update README.mdKevin Robertson1-1/+3
2017-04-02mDNS spoofer, log control, bug fixesKevin Robertson3-875/+1882
Added mDNS spoofer. Simplified some HTTP listener code. Added LogOutput and ConsoleQueueLimit parameters to control in-memory log entry storage. Fixed some bugs.
2017-03-27bug fixes and partial readme updateKevin Robertson3-125/+83
2017-03-26POST request capture, ConsoleOutput levels, bug fixesKevin Robertson2-538/+723
Added additional ConsoleOutput levels. Inveigh.ps1 - Added ability to capture POST requests for use when serving up forms. Added limited ability automatically serve content to browsers during proxy auth attacks.
2017-03-21Added Firefox blocking for proxy authKevin Robertson2-41/+108
Added ProxyIgnore parameter for controlling browser user agents string that get blocked from the proxy auth process. Firefox is listed by default since it doesn't play nice with the proxy failover.
2017-03-21Merged Inveigh and Inveigh-Unprivileged, added proxy authKevin Robertson4-3014/+1565
I decided to do more for 1.3. I still need to do a lot of testing for these versions and make a few tweaks. Inveigh.ps1 - I merged Inveigh and Inveigh-Unprivileged together without losing any funtionality. By default, Inveigh will detect privilege and the run what's appropriate. Basically, an elevated privileged shell = old Inveigh, non-elevated = old Inveigh-Unprivileged. You can also set the mode manually through ElevatedPrivilege. I also added proxy authentication (thanks to Laurent Gaffie and Mubix for the idea from Responder) to grab challenge/response hashes or basic cleartext. Added support for serving HTA code through HTTPResponse or stored files. Inveigh-Relay.ps1 - Added proxy authentication relay. Enabled NTLMv1 relay. Added auto-exit (RelayAutoExit) after success. Inveigh-Unprivileged.ps1 - gone
2017-03-07Added support for longer commands with Inveigh-RelayKevin Robertson3-257/+443
Inveigh-Relay now support longer commands such as the Empire 2.0 launchers. The current features in dev will likely be tested and released as Inveigh 1.3.
2017-02-22Bug fixesKevin Robertson2-6/+32
2017-02-06Fixed a bug that was causing auth failures during SMB relayKevin Robertson2-5/+5
2017-01-16Early 1.3 versionsKevin Robertson4-951/+2621
Invoke-InveighRelay refactor - added SMB2 support and switched to an HTTP listener that does not require admin access. Admin access is still required if installing a cert for HTTPS. Note that the system running Invoke-InveighRelay can be targeted for privesc.
2016-09-13Readme fixKevin Robertson1-8/+8
2016-09-13Final 1.2 checksKevin Robertson3-156/+152
2016-09-12Just a few more small changesKevin Robertson3-8/+17
2016-09-11Small updateKevin Robertson1-5/+10
2016-09-11Readme fixKevin Robertson1-10/+3
2016-09-11Another 1.2 update and new readmeKevin Robertson4-1537/+1385
2016-09-09Web server and learning fixesKevin Robertson4-31/+60
Fixed some issues with the Inveigh-Unprivileged web server. Modified the Inveigh learning code so that it can handle multiple requests received in quick succession.