1
0
mirror of https://github.com/calebstewart/pwncat.git synced 2024-11-23 17:15:38 +01:00
pwncat/README.md

140 lines
6.2 KiB
Markdown
Raw Normal View History

2020-05-10 22:08:50 +02:00
# pwncat
2020-05-07 04:01:08 +02:00
2020-05-10 22:08:50 +02:00
pwncat is a raw bind and reverse shell handler. It streamlines common red team
2020-05-11 01:55:47 +02:00
operations and all staging code is from your own attacker machine, not the target.
2020-05-07 04:01:08 +02:00
2020-05-10 22:08:50 +02:00
After receiving a connection, **pwncat** will setup some
common configurations when working with remote shells.
- Unset the `HISTFILE` environment variable to disable command history
2020-05-07 04:01:08 +02:00
- Normalize shell prompt
- Locate useful binaries (using `which`)
- Attempt to spawn a pseudoterminal (pty) for a full interactive session
`pwncat` knows how to spawn pty's with a few different methods and will
cross-reference the methods with the executables previously enumerated. After
spawning a pty, it will setup the controlling terminal in raw mode, so you can
interact in a similar fashion to `ssh`.
`pwncat` will also synchronize the remote pty settings (such as rows, columns,
`TERM` environment variable) with your local settings to ensure the shell
behaves correctly.
To showcase a little bit of the cool functionality, I have recorded a short
[asciinema cast](https://asciinema.org/a/YFF84YCJfp9tQHhTuGkA2PJ4T).
pwncat [documentation] is being built out on Read the Docs. Head there for
the latest usage and development documentation!
2020-05-10 22:08:50 +02:00
## Install
`pwncat` only depends on a working Python development environment. In order
to install some of the packages required with `pip`, you will likely need
your distribution's "Python Development" package. On Debian based systems,
this is `python-dev`. For Arch, the development files are shipped with the
main Python repository. For Enterprise Linux, the package is named
`python-devel`.
2020-05-15 22:13:38 +02:00
`pwncat` is configured as a standard python package with `distutils`. You
can install `pwncat` directly from GitHub with:
2020-05-15 22:13:38 +02:00
```shell script
pip install git+https://github.com/calebstewart/pwncat.git
2020-05-10 22:08:50 +02:00
```
Or, you can install after cloning the repository with:
2020-05-07 04:01:08 +02:00
```shell script
python setup.py install
2020-05-10 22:08:50 +02:00
```
`pwncat` depends on a custom fork of both `prompt_toolkit` and `paramiko`.
The forks of these repositories simply added some small features which
weren't accessible in published releases. Pull requests have been submitted
upstream, but until they are (hopefully) merged, `pwncat` will continue to
explicitly reference these forks. As a result, it is recommended to run
`pwncat` from within a virtual environment in order to not pollute your
system environment with the custom packages. To setup a virtual environment
and install `pwncat`, you can use:
```shell script
python3 -m venv pwncat-env
source pwncat-env/bin/activate
python setup.py install
2020-05-10 22:08:50 +02:00
```
2020-05-07 04:01:08 +02:00
If you would like to develop custom privilege escalation or persistence
modules, we recommend you use the `develop` target vice the `install` target
for `setup.py`. This allows changes to the local repository to immediately
be observed with your installed package.
2020-05-07 04:01:08 +02:00
## Features and Functionality
`pwncat` provides two main features. At it's core, it's goal is to automatically
setup a remote PseudoTerminal (pty) which allows interaction with the remote
host much like a full SSH session. When operating in a pty, you can use common
features of your remote shell such as history, line editing, and graphical
terminal applications.
The other half of `pwncat` is a framework which utilizes your remote shell to
perform automated enumeration, persistence and privilege escalation tasks. The
local `pwncat` prompt provides a number of useful features for standard
penetration tests including:
* File upload and download
* Automated privilege escalation enumeration
* Automated privielge escalation execution
* Automated persistence installation/removal
* Automated tracking of modified/created files
* `pwncat` also offers the ability to revert these remote "tampers" automatically
The underlying framework for interacting with the remote host aims to abstract
away the underlying shell and connection method as much as possible, allowing
commands and plugins to interact seamlessly with the remote host.
You can learn more about interacting with `pwncat` and about the underlying framework
in the [documentation]. If you have an idea for a
new privilege escalation method or persistence method, please take a look at the
API documentation specifically. Pull requests are welcome!
2020-05-10 22:08:50 +02:00
## Planned Features
2020-05-07 04:01:08 +02:00
2020-05-10 22:08:50 +02:00
**pwncat** would like to be come a red team swiss army knife. Hopefully soon,
more features will be added.
2020-05-07 04:01:08 +02:00
2020-05-10 22:08:50 +02:00
* More privilege escalation methods (sudo -u#-1 CVE, LXD containers, etc.)
* Persistence methods (bind shell, cronjobs, SSH access, PAM abuse, etc.)
* Aggression methods (spam randomness to terminals, flush firewall, etc.)
* Meme methods (terminal-parrot, cowsay, wall, etc.)
* Network methods (port forward, internet access through host, etc.)
2020-05-22 22:47:50 +02:00
[documentation]: https://pwncat.readthedocs.io/en/latest
## Known Issues
Because `pwncat` is trying to abstractly interact with any shell with minimal remote system
dependencies, there are some edge cases we have found. Where we find them, we do
everything we can to account for them and hide them from the user. However, some have
slipped through the cracks and been observed in the wild. When this happens, `pwncat`
will do whatever it can to preserve your terminal, but you may be greeted with some
peculiar output or command failures.
### Dash Support
The Debian shell `dash` aims to be a very minimalistic shell. It's focus is not on user
interface, but on running scripts quickly and correctly. As a result, some of the features
we expect from an interactive shell simply don't work in `dash`. `pwncat` tries not to
depend on a specific shell environment, so if you start your reverse or bind shell with
`/bin/sh` or `/bin/dash`, then you may get a weird prompt. `dash` does not obey the
terminal escape sequences which `pwncat` adds, so you may get a very long terminal like this:
```shell script
\[\033[01;31m\](remote)\[\033[00m\] \[\033[01;33m\]\u@\h\[\033[00m\]:\[\033[01;36m\]\w\[\033[00m\]$
```
We are currently trying to figure out an acceptible way of handling with. `dash` (and other
minimalist shells) are capable of handling terminal escape sequences for color, but inserting
things like user and host name automatically are unsupported.
While this is inconvenient, it does not affect the behaviour of `pwncat`. All `pwncat`
features will continue to function properly.