Disable Mimikatz token::elevate detection; I thought I was on to a cool detect, but sadly it's just Windows operating normally with excessive privileges.
This commit is contained in:
41
DeepBlue.ps1
41
DeepBlue.ps1
@ -137,26 +137,27 @@ function Main {
|
|||||||
#$adminlogons($username)+=($securitysid)
|
#$adminlogons($username)+=($securitysid)
|
||||||
}
|
}
|
||||||
# This unique privilege list is used by Mimikatz 2.2.0
|
# This unique privilege list is used by Mimikatz 2.2.0
|
||||||
If ($privileges -Match "SeAssignPrimaryTokenPrivilege" `
|
# Disabling due to false-positive with MS Exchange.
|
||||||
-And $privileges -Match "SeTcbPrivilege" `
|
# If ($privileges -Match "SeAssignPrimaryTokenPrivilege" `
|
||||||
-And $privileges -Match "SeSecurityPrivilege" `
|
# -And $privileges -Match "SeTcbPrivilege" `
|
||||||
-And $privileges -Match "SeTakeOwnershipPrivilege" `
|
# -And $privileges -Match "SeSecurityPrivilege" `
|
||||||
-And $privileges -Match "SeLoadDriverPrivilege" `
|
# -And $privileges -Match "SeTakeOwnershipPrivilege" `
|
||||||
-And $privileges -Match "SeBackupPrivilege" `
|
# -And $privileges -Match "SeLoadDriverPrivilege" `
|
||||||
-And $privileges -Match "SeRestorePrivilege" `
|
# -And $privileges -Match "SeBackupPrivilege" `
|
||||||
-And $privileges -Match "SeDebugPrivilege" `
|
# -And $privileges -Match "SeRestorePrivilege" `
|
||||||
-And $privileges -Match "SeAuditPrivilege" `
|
# -And $privileges -Match "SeDebugPrivilege" `
|
||||||
-And $privileges -Match "SeSystemEnvironmentPrivilege" `
|
# -And $privileges -Match "SeAuditPrivilege" `
|
||||||
-And $privileges -Match "SeImpersonatePrivilege" `
|
# -And $privileges -Match "SeSystemEnvironmentPrivilege" `
|
||||||
-And $privileges -Match "SeDelegateSessionUserImpersonatePrivilege") {
|
# -And $privileges -Match "SeImpersonatePrivilege" `
|
||||||
$obj.Message = "Mimikatz token::elevate Privilege Use"
|
# -And $privileges -Match "SeDelegateSessionUserImpersonatePrivilege") {
|
||||||
$obj.Results = "Username: $username`n"
|
# $obj.Message = "Mimikatz token::elevate Privilege Use"
|
||||||
$obj.Results += "Domain: $domain`n"
|
# $obj.Results = "Username: $username`n"
|
||||||
$obj.Results += "User SID: $securityid`n"
|
# $obj.Results += "Domain: $domain`n"
|
||||||
$pprivileges = $privileges -replace "`n",", " -replace "\s+"," "
|
# $obj.Results += "User SID: $securityid`n"
|
||||||
$obj.Results += "Privileges: $pprivileges"
|
# $pprivileges = $privileges -replace "`n",", " -replace "\s+"," "
|
||||||
Write-Output($obj)
|
# $obj.Results += "Privileges: $pprivileges"
|
||||||
}
|
# Write-Output($obj)
|
||||||
|
# }
|
||||||
# This unique privilege list is used by Metasploit exploit/windows/smb/psexec (v5.0.4 tested)
|
# This unique privilege list is used by Metasploit exploit/windows/smb/psexec (v5.0.4 tested)
|
||||||
# # Disabling due to false-positive with MS Exchange Server
|
# # Disabling due to false-positive with MS Exchange Server
|
||||||
# If ($privileges -Match "SeSecurityPrivilege" `
|
# If ($privileges -Match "SeSecurityPrivilege" `
|
||||||
|
Reference in New Issue
Block a user