psremote.c 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126
  1. #include <windows.h>
  2. #include <stdio.h>
  3. #include <wtsapi32.h>
  4. #include "beacon.h"
  5. #include "psremote.h"
  6. //START TrustedSec BOF print code: https://github.com/trustedsec/CS-Situational-Awareness-BOF/blob/master/src/common/base.c
  7. #ifndef bufsize
  8. #define bufsize 8192
  9. #endif
  10. char *output = 0;
  11. WORD currentoutsize = 0;
  12. HANDLE trash = NULL;
  13. int bofstart();
  14. void internal_printf(const char* format, ...);
  15. void printoutput(BOOL done);
  16. int bofstart() {
  17. output = (char*)MSVCRT$calloc(bufsize, 1);
  18. currentoutsize = 0;
  19. return 1;
  20. }
  21. void internal_printf(const char* format, ...){
  22. int buffersize = 0;
  23. int transfersize = 0;
  24. char * curloc = NULL;
  25. char* intBuffer = NULL;
  26. va_list args;
  27. va_start(args, format);
  28. buffersize = MSVCRT$vsnprintf(NULL, 0, format, args);
  29. va_end(args);
  30. if (buffersize == -1) return;
  31. char* transferBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, bufsize);
  32. intBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, buffersize);
  33. va_start(args, format);
  34. MSVCRT$vsnprintf(intBuffer, buffersize, format, args);
  35. va_end(args);
  36. if(buffersize + currentoutsize < bufsize)
  37. {
  38. MSVCRT$memcpy(output+currentoutsize, intBuffer, buffersize);
  39. currentoutsize += buffersize;
  40. } else {
  41. curloc = intBuffer;
  42. while(buffersize > 0)
  43. {
  44. transfersize = bufsize - currentoutsize;
  45. if(buffersize < transfersize)
  46. {
  47. transfersize = buffersize;
  48. }
  49. MSVCRT$memcpy(output+currentoutsize, curloc, transfersize);
  50. currentoutsize += transfersize;
  51. if(currentoutsize == bufsize)
  52. {
  53. printoutput(FALSE);
  54. }
  55. MSVCRT$memset(transferBuffer, 0, transfersize);
  56. curloc += transfersize;
  57. buffersize -= transfersize;
  58. }
  59. }
  60. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, intBuffer);
  61. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, transferBuffer);
  62. }
  63. void printoutput(BOOL done) {
  64. char * msg = NULL;
  65. BeaconOutput(CALLBACK_OUTPUT, output, currentoutsize);
  66. currentoutsize = 0;
  67. MSVCRT$memset(output, 0, bufsize);
  68. if(done) {MSVCRT$free(output); output=NULL;}
  69. }
  70. //END TrustedSec BOF print code.
  71. BOOL ListProcesses(HANDLE handleTargetHost) {
  72. WTS_PROCESS_INFOA * proc_info;
  73. DWORD pi_count = 0;
  74. LPSTR procName;
  75. BOOL RemoteProc = FALSE;
  76. if (!WTSAPI32$WTSEnumerateProcessesA(handleTargetHost, 0, 1, &proc_info, &pi_count)) {
  77. BeaconPrintf(CALLBACK_ERROR, "Failed to get a valid handle to the specified host!\n");
  78. return RemoteProc;
  79. }
  80. internal_printf("\nProcess name\t\t\t\tPID\t\t\tSessionID\n");
  81. internal_printf("===================================================================================\n");
  82. for (int i = 0; i < pi_count; i++) {
  83. procName = proc_info[i].pProcessName;
  84. internal_printf("%-40s\t%d\t%23d\n", procName, proc_info[i].ProcessId, proc_info[i].SessionId);
  85. RemoteProc = TRUE;
  86. }
  87. WTSAPI32$WTSCloseServer(handleTargetHost);
  88. return RemoteProc;
  89. }
  90. void go(char *args, int len) {
  91. CHAR *hostName = "";
  92. datap parser;
  93. DWORD argSize = NULL;
  94. HANDLE handleTargetHost = NULL;
  95. BOOL res = NULL;
  96. BeaconDataParse(&parser, args, len);
  97. hostName = BeaconDataExtract(&parser, &argSize);
  98. if(!bofstart()) return;
  99. handleTargetHost = WTSAPI32$WTSOpenServerA(hostName);
  100. res = ListProcesses(handleTargetHost);
  101. if (!res) {
  102. BeaconPrintf(CALLBACK_ERROR, "Couldn't list remote processes. Do you have enough privileges on the target host?\n");
  103. }
  104. else {
  105. printoutput(TRUE);
  106. BeaconPrintf(CALLBACK_OUTPUT, "[+] Finished enumerating.");
  107. }
  108. return 0;
  109. }