| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126 |
- #include <windows.h>
- #include <stdio.h>
- #include <wtsapi32.h>
- #include "beacon.h"
- #include "psremote.h"
- //START TrustedSec BOF print code: https://github.com/trustedsec/CS-Situational-Awareness-BOF/blob/master/src/common/base.c
- #ifndef bufsize
- #define bufsize 8192
- #endif
- char *output = 0;
- WORD currentoutsize = 0;
- HANDLE trash = NULL;
- int bofstart();
- void internal_printf(const char* format, ...);
- void printoutput(BOOL done);
- int bofstart() {
- output = (char*)MSVCRT$calloc(bufsize, 1);
- currentoutsize = 0;
- return 1;
- }
- void internal_printf(const char* format, ...){
- int buffersize = 0;
- int transfersize = 0;
- char * curloc = NULL;
- char* intBuffer = NULL;
- va_list args;
- va_start(args, format);
- buffersize = MSVCRT$vsnprintf(NULL, 0, format, args);
- va_end(args);
-
- if (buffersize == -1) return;
-
- char* transferBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, bufsize);
- intBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, buffersize);
- va_start(args, format);
- MSVCRT$vsnprintf(intBuffer, buffersize, format, args);
- va_end(args);
- if(buffersize + currentoutsize < bufsize)
- {
- MSVCRT$memcpy(output+currentoutsize, intBuffer, buffersize);
- currentoutsize += buffersize;
- } else {
- curloc = intBuffer;
- while(buffersize > 0)
- {
- transfersize = bufsize - currentoutsize;
- if(buffersize < transfersize)
- {
- transfersize = buffersize;
- }
- MSVCRT$memcpy(output+currentoutsize, curloc, transfersize);
- currentoutsize += transfersize;
- if(currentoutsize == bufsize)
- {
- printoutput(FALSE);
- }
- MSVCRT$memset(transferBuffer, 0, transfersize);
- curloc += transfersize;
- buffersize -= transfersize;
- }
- }
- KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, intBuffer);
- KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, transferBuffer);
- }
- void printoutput(BOOL done) {
- char * msg = NULL;
- BeaconOutput(CALLBACK_OUTPUT, output, currentoutsize);
- currentoutsize = 0;
- MSVCRT$memset(output, 0, bufsize);
- if(done) {MSVCRT$free(output); output=NULL;}
- }
- //END TrustedSec BOF print code.
- BOOL ListProcesses(HANDLE handleTargetHost) {
- WTS_PROCESS_INFOA * proc_info;
- DWORD pi_count = 0;
- LPSTR procName;
- BOOL RemoteProc = FALSE;
- if (!WTSAPI32$WTSEnumerateProcessesA(handleTargetHost, 0, 1, &proc_info, &pi_count)) {
- BeaconPrintf(CALLBACK_ERROR, "Failed to get a valid handle to the specified host!\n");
- return RemoteProc;
- }
- internal_printf("\nProcess name\t\t\t\tPID\t\t\tSessionID\n");
- internal_printf("===================================================================================\n");
- for (int i = 0; i < pi_count; i++) {
- procName = proc_info[i].pProcessName;
- internal_printf("%-40s\t%d\t%23d\n", procName, proc_info[i].ProcessId, proc_info[i].SessionId);
- RemoteProc = TRUE;
- }
- WTSAPI32$WTSCloseServer(handleTargetHost);
- return RemoteProc;
- }
- void go(char *args, int len) {
- CHAR *hostName = "";
- datap parser;
- DWORD argSize = NULL;
- HANDLE handleTargetHost = NULL;
- BOOL res = NULL;
- BeaconDataParse(&parser, args, len);
- hostName = BeaconDataExtract(&parser, &argSize);
- if(!bofstart()) return;
- handleTargetHost = WTSAPI32$WTSOpenServerA(hostName);
- res = ListProcesses(handleTargetHost);
- if (!res) {
- BeaconPrintf(CALLBACK_ERROR, "Couldn't list remote processes. Do you have enough privileges on the target host?\n");
- }
- else {
- printoutput(TRUE);
- BeaconPrintf(CALLBACK_OUTPUT, "[+] Finished enumerating.");
- }
- return 0;
- }
|