souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of souleyez might be problematic. Click here for more details.

Files changed (358) hide show
  1. souleyez/__init__.py +1 -2
  2. souleyez/ai/__init__.py +21 -15
  3. souleyez/ai/action_mapper.py +249 -150
  4. souleyez/ai/chain_advisor.py +116 -100
  5. souleyez/ai/claude_provider.py +29 -28
  6. souleyez/ai/context_builder.py +80 -62
  7. souleyez/ai/executor.py +158 -117
  8. souleyez/ai/feedback_handler.py +136 -121
  9. souleyez/ai/llm_factory.py +27 -20
  10. souleyez/ai/llm_provider.py +4 -2
  11. souleyez/ai/ollama_provider.py +6 -9
  12. souleyez/ai/ollama_service.py +44 -37
  13. souleyez/ai/path_scorer.py +91 -76
  14. souleyez/ai/recommender.py +176 -144
  15. souleyez/ai/report_context.py +74 -73
  16. souleyez/ai/report_service.py +84 -66
  17. souleyez/ai/result_parser.py +222 -229
  18. souleyez/ai/safety.py +67 -44
  19. souleyez/auth/__init__.py +23 -22
  20. souleyez/auth/audit.py +36 -26
  21. souleyez/auth/engagement_access.py +65 -48
  22. souleyez/auth/permissions.py +14 -3
  23. souleyez/auth/session_manager.py +54 -37
  24. souleyez/auth/user_manager.py +109 -64
  25. souleyez/commands/audit.py +40 -43
  26. souleyez/commands/auth.py +35 -15
  27. souleyez/commands/deliverables.py +55 -50
  28. souleyez/commands/engagement.py +47 -28
  29. souleyez/commands/license.py +32 -23
  30. souleyez/commands/screenshots.py +36 -32
  31. souleyez/commands/user.py +82 -36
  32. souleyez/config.py +52 -44
  33. souleyez/core/credential_tester.py +87 -81
  34. souleyez/core/cve_mappings.py +179 -192
  35. souleyez/core/cve_matcher.py +162 -148
  36. souleyez/core/msf_auto_mapper.py +100 -83
  37. souleyez/core/msf_chain_engine.py +294 -256
  38. souleyez/core/msf_database.py +153 -70
  39. souleyez/core/msf_integration.py +679 -673
  40. souleyez/core/msf_rpc_client.py +40 -42
  41. souleyez/core/msf_rpc_manager.py +77 -79
  42. souleyez/core/msf_sync_manager.py +241 -181
  43. souleyez/core/network_utils.py +22 -15
  44. souleyez/core/parser_handler.py +34 -25
  45. souleyez/core/pending_chains.py +114 -63
  46. souleyez/core/templates.py +158 -107
  47. souleyez/core/tool_chaining.py +9526 -2879
  48. souleyez/core/version_utils.py +79 -94
  49. souleyez/core/vuln_correlation.py +136 -89
  50. souleyez/core/web_utils.py +33 -32
  51. souleyez/data/wordlists/ad_users.txt +378 -0
  52. souleyez/data/wordlists/api_endpoints_large.txt +769 -0
  53. souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
  54. souleyez/data/wordlists/lfi_payloads.txt +82 -0
  55. souleyez/data/wordlists/passwords_brute.txt +1548 -0
  56. souleyez/data/wordlists/passwords_crack.txt +2479 -0
  57. souleyez/data/wordlists/passwords_spray.txt +386 -0
  58. souleyez/data/wordlists/subdomains_large.txt +5057 -0
  59. souleyez/data/wordlists/usernames_common.txt +694 -0
  60. souleyez/data/wordlists/web_dirs_large.txt +4769 -0
  61. souleyez/detection/__init__.py +1 -1
  62. souleyez/detection/attack_signatures.py +12 -17
  63. souleyez/detection/mitre_mappings.py +61 -55
  64. souleyez/detection/validator.py +97 -86
  65. souleyez/devtools.py +23 -10
  66. souleyez/docs/README.md +4 -4
  67. souleyez/docs/api-reference/cli-commands.md +2 -2
  68. souleyez/docs/developer-guide/adding-new-tools.md +562 -0
  69. souleyez/docs/user-guide/auto-chaining.md +30 -8
  70. souleyez/docs/user-guide/getting-started.md +1 -1
  71. souleyez/docs/user-guide/installation.md +26 -3
  72. souleyez/docs/user-guide/metasploit-integration.md +2 -2
  73. souleyez/docs/user-guide/rbac.md +1 -1
  74. souleyez/docs/user-guide/scope-management.md +1 -1
  75. souleyez/docs/user-guide/siem-integration.md +1 -1
  76. souleyez/docs/user-guide/tools-reference.md +1 -8
  77. souleyez/docs/user-guide/worker-management.md +1 -1
  78. souleyez/engine/background.py +1239 -535
  79. souleyez/engine/base.py +4 -1
  80. souleyez/engine/job_status.py +17 -49
  81. souleyez/engine/log_sanitizer.py +103 -77
  82. souleyez/engine/manager.py +38 -7
  83. souleyez/engine/result_handler.py +2200 -1550
  84. souleyez/engine/worker_manager.py +50 -41
  85. souleyez/export/evidence_bundle.py +72 -62
  86. souleyez/feature_flags/features.py +16 -20
  87. souleyez/feature_flags.py +5 -9
  88. souleyez/handlers/__init__.py +11 -0
  89. souleyez/handlers/base.py +188 -0
  90. souleyez/handlers/bash_handler.py +277 -0
  91. souleyez/handlers/bloodhound_handler.py +243 -0
  92. souleyez/handlers/certipy_handler.py +311 -0
  93. souleyez/handlers/crackmapexec_handler.py +486 -0
  94. souleyez/handlers/dnsrecon_handler.py +344 -0
  95. souleyez/handlers/enum4linux_handler.py +400 -0
  96. souleyez/handlers/evil_winrm_handler.py +493 -0
  97. souleyez/handlers/ffuf_handler.py +815 -0
  98. souleyez/handlers/gobuster_handler.py +1114 -0
  99. souleyez/handlers/gpp_extract_handler.py +334 -0
  100. souleyez/handlers/hashcat_handler.py +444 -0
  101. souleyez/handlers/hydra_handler.py +563 -0
  102. souleyez/handlers/impacket_getuserspns_handler.py +343 -0
  103. souleyez/handlers/impacket_psexec_handler.py +222 -0
  104. souleyez/handlers/impacket_secretsdump_handler.py +426 -0
  105. souleyez/handlers/john_handler.py +286 -0
  106. souleyez/handlers/katana_handler.py +425 -0
  107. souleyez/handlers/kerbrute_handler.py +298 -0
  108. souleyez/handlers/ldapsearch_handler.py +636 -0
  109. souleyez/handlers/lfi_extract_handler.py +464 -0
  110. souleyez/handlers/msf_auxiliary_handler.py +408 -0
  111. souleyez/handlers/msf_exploit_handler.py +380 -0
  112. souleyez/handlers/nikto_handler.py +413 -0
  113. souleyez/handlers/nmap_handler.py +821 -0
  114. souleyez/handlers/nuclei_handler.py +359 -0
  115. souleyez/handlers/nxc_handler.py +371 -0
  116. souleyez/handlers/rdp_sec_check_handler.py +353 -0
  117. souleyez/handlers/registry.py +292 -0
  118. souleyez/handlers/responder_handler.py +232 -0
  119. souleyez/handlers/service_explorer_handler.py +434 -0
  120. souleyez/handlers/smbclient_handler.py +344 -0
  121. souleyez/handlers/smbmap_handler.py +510 -0
  122. souleyez/handlers/smbpasswd_handler.py +296 -0
  123. souleyez/handlers/sqlmap_handler.py +1116 -0
  124. souleyez/handlers/theharvester_handler.py +601 -0
  125. souleyez/handlers/web_login_test_handler.py +327 -0
  126. souleyez/handlers/whois_handler.py +277 -0
  127. souleyez/handlers/wpscan_handler.py +554 -0
  128. souleyez/history.py +32 -16
  129. souleyez/importers/msf_importer.py +106 -75
  130. souleyez/importers/smart_importer.py +208 -147
  131. souleyez/integrations/siem/__init__.py +10 -10
  132. souleyez/integrations/siem/base.py +17 -18
  133. souleyez/integrations/siem/elastic.py +108 -122
  134. souleyez/integrations/siem/factory.py +207 -80
  135. souleyez/integrations/siem/googlesecops.py +146 -154
  136. souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
  137. souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
  138. souleyez/integrations/siem/sentinel.py +107 -109
  139. souleyez/integrations/siem/splunk.py +246 -212
  140. souleyez/integrations/siem/wazuh.py +65 -71
  141. souleyez/integrations/wazuh/__init__.py +5 -5
  142. souleyez/integrations/wazuh/client.py +70 -93
  143. souleyez/integrations/wazuh/config.py +85 -57
  144. souleyez/integrations/wazuh/host_mapper.py +28 -36
  145. souleyez/integrations/wazuh/sync.py +78 -68
  146. souleyez/intelligence/__init__.py +4 -5
  147. souleyez/intelligence/correlation_analyzer.py +309 -295
  148. souleyez/intelligence/exploit_knowledge.py +661 -623
  149. souleyez/intelligence/exploit_suggestions.py +159 -139
  150. souleyez/intelligence/gap_analyzer.py +132 -97
  151. souleyez/intelligence/gap_detector.py +251 -214
  152. souleyez/intelligence/sensitive_tables.py +266 -129
  153. souleyez/intelligence/service_parser.py +137 -123
  154. souleyez/intelligence/surface_analyzer.py +407 -268
  155. souleyez/intelligence/target_parser.py +159 -162
  156. souleyez/licensing/__init__.py +6 -6
  157. souleyez/licensing/validator.py +17 -19
  158. souleyez/log_config.py +79 -54
  159. souleyez/main.py +1505 -687
  160. souleyez/migrations/fix_job_counter.py +16 -14
  161. souleyez/parsers/bloodhound_parser.py +41 -39
  162. souleyez/parsers/crackmapexec_parser.py +178 -111
  163. souleyez/parsers/dalfox_parser.py +72 -77
  164. souleyez/parsers/dnsrecon_parser.py +103 -91
  165. souleyez/parsers/enum4linux_parser.py +183 -153
  166. souleyez/parsers/ffuf_parser.py +29 -25
  167. souleyez/parsers/gobuster_parser.py +301 -41
  168. souleyez/parsers/hashcat_parser.py +324 -79
  169. souleyez/parsers/http_fingerprint_parser.py +350 -103
  170. souleyez/parsers/hydra_parser.py +131 -111
  171. souleyez/parsers/impacket_parser.py +231 -178
  172. souleyez/parsers/john_parser.py +98 -86
  173. souleyez/parsers/katana_parser.py +316 -0
  174. souleyez/parsers/msf_parser.py +943 -498
  175. souleyez/parsers/nikto_parser.py +346 -65
  176. souleyez/parsers/nmap_parser.py +262 -174
  177. souleyez/parsers/nuclei_parser.py +40 -44
  178. souleyez/parsers/responder_parser.py +26 -26
  179. souleyez/parsers/searchsploit_parser.py +74 -74
  180. souleyez/parsers/service_explorer_parser.py +279 -0
  181. souleyez/parsers/smbmap_parser.py +180 -124
  182. souleyez/parsers/sqlmap_parser.py +434 -308
  183. souleyez/parsers/theharvester_parser.py +75 -57
  184. souleyez/parsers/whois_parser.py +135 -94
  185. souleyez/parsers/wpscan_parser.py +278 -190
  186. souleyez/plugins/afp.py +44 -36
  187. souleyez/plugins/afp_brute.py +114 -46
  188. souleyez/plugins/ard.py +48 -37
  189. souleyez/plugins/bloodhound.py +95 -61
  190. souleyez/plugins/certipy.py +303 -0
  191. souleyez/plugins/crackmapexec.py +186 -85
  192. souleyez/plugins/dalfox.py +120 -59
  193. souleyez/plugins/dns_hijack.py +146 -41
  194. souleyez/plugins/dnsrecon.py +97 -61
  195. souleyez/plugins/enum4linux.py +91 -66
  196. souleyez/plugins/evil_winrm.py +291 -0
  197. souleyez/plugins/ffuf.py +166 -90
  198. souleyez/plugins/firmware_extract.py +133 -29
  199. souleyez/plugins/gobuster.py +387 -190
  200. souleyez/plugins/gpp_extract.py +393 -0
  201. souleyez/plugins/hashcat.py +100 -73
  202. souleyez/plugins/http_fingerprint.py +854 -267
  203. souleyez/plugins/hydra.py +566 -200
  204. souleyez/plugins/impacket_getnpusers.py +117 -69
  205. souleyez/plugins/impacket_psexec.py +84 -64
  206. souleyez/plugins/impacket_secretsdump.py +103 -69
  207. souleyez/plugins/impacket_smbclient.py +89 -75
  208. souleyez/plugins/john.py +86 -69
  209. souleyez/plugins/katana.py +313 -0
  210. souleyez/plugins/kerbrute.py +237 -0
  211. souleyez/plugins/lfi_extract.py +541 -0
  212. souleyez/plugins/macos_ssh.py +117 -48
  213. souleyez/plugins/mdns.py +35 -30
  214. souleyez/plugins/msf_auxiliary.py +253 -130
  215. souleyez/plugins/msf_exploit.py +239 -161
  216. souleyez/plugins/nikto.py +134 -78
  217. souleyez/plugins/nmap.py +275 -91
  218. souleyez/plugins/nuclei.py +180 -89
  219. souleyez/plugins/nxc.py +285 -0
  220. souleyez/plugins/plugin_base.py +35 -36
  221. souleyez/plugins/plugin_template.py +13 -5
  222. souleyez/plugins/rdp_sec_check.py +130 -0
  223. souleyez/plugins/responder.py +112 -71
  224. souleyez/plugins/router_http_brute.py +76 -65
  225. souleyez/plugins/router_ssh_brute.py +118 -41
  226. souleyez/plugins/router_telnet_brute.py +124 -42
  227. souleyez/plugins/routersploit.py +91 -59
  228. souleyez/plugins/routersploit_exploit.py +77 -55
  229. souleyez/plugins/searchsploit.py +91 -77
  230. souleyez/plugins/service_explorer.py +1160 -0
  231. souleyez/plugins/smbmap.py +122 -72
  232. souleyez/plugins/smbpasswd.py +215 -0
  233. souleyez/plugins/sqlmap.py +301 -113
  234. souleyez/plugins/theharvester.py +127 -75
  235. souleyez/plugins/tr069.py +79 -57
  236. souleyez/plugins/upnp.py +65 -47
  237. souleyez/plugins/upnp_abuse.py +73 -55
  238. souleyez/plugins/vnc_access.py +129 -42
  239. souleyez/plugins/vnc_brute.py +109 -38
  240. souleyez/plugins/web_login_test.py +417 -0
  241. souleyez/plugins/whois.py +77 -58
  242. souleyez/plugins/wpscan.py +173 -69
  243. souleyez/reporting/__init__.py +2 -1
  244. souleyez/reporting/attack_chain.py +411 -346
  245. souleyez/reporting/charts.py +436 -501
  246. souleyez/reporting/compliance_mappings.py +334 -201
  247. souleyez/reporting/detection_report.py +126 -125
  248. souleyez/reporting/formatters.py +828 -591
  249. souleyez/reporting/generator.py +386 -302
  250. souleyez/reporting/metrics.py +72 -75
  251. souleyez/scanner.py +35 -29
  252. souleyez/security/__init__.py +37 -11
  253. souleyez/security/scope_validator.py +175 -106
  254. souleyez/security/validation.py +223 -149
  255. souleyez/security.py +22 -6
  256. souleyez/storage/credentials.py +247 -186
  257. souleyez/storage/crypto.py +296 -129
  258. souleyez/storage/database.py +73 -50
  259. souleyez/storage/db.py +58 -36
  260. souleyez/storage/deliverable_evidence.py +177 -128
  261. souleyez/storage/deliverable_exporter.py +282 -246
  262. souleyez/storage/deliverable_templates.py +134 -116
  263. souleyez/storage/deliverables.py +135 -130
  264. souleyez/storage/engagements.py +109 -56
  265. souleyez/storage/evidence.py +181 -152
  266. souleyez/storage/execution_log.py +31 -17
  267. souleyez/storage/exploit_attempts.py +93 -57
  268. souleyez/storage/exploits.py +67 -36
  269. souleyez/storage/findings.py +48 -61
  270. souleyez/storage/hosts.py +176 -144
  271. souleyez/storage/migrate_to_engagements.py +43 -19
  272. souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
  273. souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
  274. souleyez/storage/migrations/_003_add_execution_log.py +14 -8
  275. souleyez/storage/migrations/_005_screenshots.py +13 -5
  276. souleyez/storage/migrations/_006_deliverables.py +13 -5
  277. souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
  278. souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
  279. souleyez/storage/migrations/_010_evidence_linking.py +17 -10
  280. souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
  281. souleyez/storage/migrations/_012_team_collaboration.py +34 -21
  282. souleyez/storage/migrations/_013_add_host_tags.py +12 -6
  283. souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
  284. souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
  285. souleyez/storage/migrations/_016_add_domain_field.py +10 -4
  286. souleyez/storage/migrations/_017_msf_sessions.py +16 -8
  287. souleyez/storage/migrations/_018_add_osint_target.py +10 -6
  288. souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
  289. souleyez/storage/migrations/_020_add_rbac.py +36 -15
  290. souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
  291. souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
  292. souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
  293. souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
  294. souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
  295. souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
  296. souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
  297. souleyez/storage/migrations/__init__.py +26 -26
  298. souleyez/storage/migrations/migration_manager.py +19 -19
  299. souleyez/storage/msf_sessions.py +100 -65
  300. souleyez/storage/osint.py +17 -24
  301. souleyez/storage/recommendation_engine.py +269 -235
  302. souleyez/storage/screenshots.py +33 -32
  303. souleyez/storage/smb_shares.py +136 -92
  304. souleyez/storage/sqlmap_data.py +183 -128
  305. souleyez/storage/team_collaboration.py +135 -141
  306. souleyez/storage/timeline_tracker.py +122 -94
  307. souleyez/storage/wazuh_vulns.py +64 -66
  308. souleyez/storage/web_paths.py +33 -37
  309. souleyez/testing/credential_tester.py +221 -205
  310. souleyez/ui/__init__.py +1 -1
  311. souleyez/ui/ai_quotes.py +12 -12
  312. souleyez/ui/attack_surface.py +2439 -1516
  313. souleyez/ui/chain_rules_view.py +914 -382
  314. souleyez/ui/correlation_view.py +312 -230
  315. souleyez/ui/dashboard.py +2382 -1130
  316. souleyez/ui/deliverables_view.py +148 -62
  317. souleyez/ui/design_system.py +13 -13
  318. souleyez/ui/errors.py +49 -49
  319. souleyez/ui/evidence_linking_view.py +284 -179
  320. souleyez/ui/evidence_vault.py +393 -285
  321. souleyez/ui/exploit_suggestions_view.py +555 -349
  322. souleyez/ui/export_view.py +100 -66
  323. souleyez/ui/gap_analysis_view.py +315 -171
  324. souleyez/ui/help_system.py +105 -97
  325. souleyez/ui/intelligence_view.py +436 -293
  326. souleyez/ui/interactive.py +23434 -10286
  327. souleyez/ui/interactive_selector.py +75 -68
  328. souleyez/ui/log_formatter.py +47 -39
  329. souleyez/ui/menu_components.py +22 -13
  330. souleyez/ui/msf_auxiliary_menu.py +184 -133
  331. souleyez/ui/pending_chains_view.py +336 -172
  332. souleyez/ui/progress_indicators.py +5 -3
  333. souleyez/ui/recommendations_view.py +195 -137
  334. souleyez/ui/rule_builder.py +343 -225
  335. souleyez/ui/setup_wizard.py +678 -284
  336. souleyez/ui/shortcuts.py +217 -165
  337. souleyez/ui/splunk_gap_analysis_view.py +452 -270
  338. souleyez/ui/splunk_vulns_view.py +139 -86
  339. souleyez/ui/team_dashboard.py +498 -335
  340. souleyez/ui/template_selector.py +196 -105
  341. souleyez/ui/terminal.py +6 -6
  342. souleyez/ui/timeline_view.py +198 -127
  343. souleyez/ui/tool_setup.py +264 -164
  344. souleyez/ui/tutorial.py +202 -72
  345. souleyez/ui/tutorial_state.py +40 -40
  346. souleyez/ui/wazuh_vulns_view.py +235 -141
  347. souleyez/ui/wordlist_browser.py +260 -107
  348. souleyez/ui.py +464 -312
  349. souleyez/utils/tool_checker.py +427 -367
  350. souleyez/utils.py +33 -29
  351. souleyez/wordlists.py +134 -167
  352. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
  353. souleyez-2.43.34.dist-info/RECORD +443 -0
  354. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
  355. souleyez-2.43.26.dist-info/RECORD +0 -379
  356. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
  357. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
  358. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,493 @@
1
+ #!/usr/bin/env python3
2
+ """
3
+ Evil-WinRM handler.
4
+
5
+ Consolidates parsing and display logic for Evil-WinRM jobs.
6
+ """
7
+ import logging
8
+ import os
9
+ import re
10
+ from typing import Any, Dict, Optional
11
+
12
+ import click
13
+
14
+ from souleyez.engine.job_status import (
15
+ STATUS_DONE,
16
+ STATUS_ERROR,
17
+ STATUS_NO_RESULTS,
18
+ STATUS_WARNING,
19
+ )
20
+ from souleyez.handlers.base import BaseToolHandler
21
+
22
+ logger = logging.getLogger(__name__)
23
+
24
+
25
+ class EvilWinRMHandler(BaseToolHandler):
26
+ """Handler for Evil-WinRM remote shell jobs."""
27
+
28
+ tool_name = "evil_winrm"
29
+ display_name = "Evil-WinRM"
30
+
31
+ # All handlers enabled
32
+ has_error_handler = True
33
+ has_warning_handler = True
34
+ has_no_results_handler = True
35
+ has_done_handler = True
36
+
37
+ # Capability flags
38
+ extracts_credentials = False # Could extract creds from command output
39
+ extracts_findings = True
40
+ extracts_services = False
41
+ supports_chaining = True
42
+
43
+ # Success patterns - indicates successful authentication
44
+ SUCCESS_PATTERNS = [
45
+ r"Evil-WinRM shell",
46
+ r"\*Evil-WinRM\*",
47
+ r"PS [A-Z]:\\",
48
+ r"Info: Establishing connection",
49
+ r"Data: PS ",
50
+ ]
51
+
52
+ # Error patterns
53
+ ERROR_PATTERNS = [
54
+ (
55
+ r"WinRM::WinRMAuthorizationError",
56
+ "User not authorized for WinRM (credentials may be valid for SMB)",
57
+ ),
58
+ (r"Access is denied", "Access denied (insufficient privileges)"),
59
+ (r"getaddrinfo: Name or service not known", "DNS resolution failed"),
60
+ (r"Connection refused", "Connection refused (WinRM not running)"),
61
+ (r"Connection timed out|Errno::ETIMEDOUT", "Connection timed out"),
62
+ (r"No route to host", "No route to host"),
63
+ (r"Network is unreachable", "Network unreachable"),
64
+ (r"SSL_connect", "SSL/TLS error (try -s for SSL or check port)"),
65
+ (r"Bad HTTP response", "Bad HTTP response (wrong port or service)"),
66
+ (r"WinRM::WinRMHTTPTransportError", "HTTP transport error"),
67
+ (r"WinRM::WinRMWSManFault", "WSMan fault (check WinRM config)"),
68
+ ]
69
+
70
+ # Warning patterns (partial success or non-critical issues)
71
+ WARNING_PATTERNS = [
72
+ (r"Warning:", "Warning encountered during execution"),
73
+ (r"Access denied to", "Access denied to specific resource"),
74
+ ]
75
+
76
+ def parse_job(
77
+ self,
78
+ engagement_id: int,
79
+ log_path: str,
80
+ job: Dict[str, Any],
81
+ host_manager: Optional[Any] = None,
82
+ findings_manager: Optional[Any] = None,
83
+ credentials_manager: Optional[Any] = None,
84
+ ) -> Dict[str, Any]:
85
+ """
86
+ Parse Evil-WinRM job results.
87
+
88
+ Determines if authentication succeeded and extracts command output.
89
+ """
90
+ try:
91
+ # Import managers if not provided
92
+ if host_manager is None:
93
+ from souleyez.storage.hosts import HostManager
94
+
95
+ host_manager = HostManager()
96
+ if findings_manager is None:
97
+ from souleyez.storage.findings import FindingsManager
98
+
99
+ findings_manager = FindingsManager()
100
+
101
+ # Read the log file
102
+ if not os.path.exists(log_path):
103
+ return {
104
+ "tool": "evil_winrm",
105
+ "status": STATUS_ERROR,
106
+ "summary": "Log file not found",
107
+ "error": "Log file not found",
108
+ }
109
+
110
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
111
+ log_content = f.read()
112
+
113
+ target = job.get("target", "")
114
+
115
+ # Extract username and password from args if present
116
+ args = job.get("args", [])
117
+ username = self._extract_username(args)
118
+ password = self._extract_password(args)
119
+
120
+ # Check for errors first
121
+ error_found = None
122
+ for pattern, message in self.ERROR_PATTERNS:
123
+ if re.search(pattern, log_content, re.IGNORECASE):
124
+ error_found = message
125
+ break
126
+
127
+ # Check for success patterns
128
+ success_found = False
129
+ for pattern in self.SUCCESS_PATTERNS:
130
+ if re.search(pattern, log_content, re.IGNORECASE):
131
+ success_found = True
132
+ break
133
+
134
+ # Extract command output if present
135
+ command_output = self._extract_command_output(log_content)
136
+
137
+ # Check for warnings
138
+ warnings = []
139
+ for pattern, message in self.WARNING_PATTERNS:
140
+ if re.search(pattern, log_content, re.IGNORECASE):
141
+ warnings.append(message)
142
+
143
+ # Determine status
144
+ if error_found:
145
+ # Check if it's a connection error vs auth error
146
+ if any(
147
+ x in error_found.lower()
148
+ for x in ["connection", "route", "network", "dns", "timed out"]
149
+ ):
150
+ status = STATUS_WARNING
151
+ summary = f"Connection failed: {error_found}"
152
+ else:
153
+ status = STATUS_ERROR
154
+ summary = error_found
155
+ elif success_found:
156
+ status = STATUS_DONE
157
+ summary = f"WinRM shell access gained"
158
+ if username:
159
+ summary += f" as {username}"
160
+
161
+ # Add finding for successful WinRM access
162
+ host = host_manager.get_host_by_ip(engagement_id, target)
163
+ if not host:
164
+ host = host_manager.add_or_update_host(
165
+ engagement_id, {"ip": target, "status": "up"}
166
+ )
167
+
168
+ findings_manager.add_finding(
169
+ engagement_id=engagement_id,
170
+ title=f"WinRM Shell Access - {target}",
171
+ finding_type="access",
172
+ severity="critical",
173
+ description=(
174
+ f"Evil-WinRM successfully authenticated to {target} over WinRM.\n\n"
175
+ f"Username: {username or 'unknown'}\n\n"
176
+ f"This provides remote PowerShell access to the target system, "
177
+ f"allowing command execution, file transfer, and potential "
178
+ f"privilege escalation.\n\n"
179
+ f"Recommendation: Review WinRM access controls and credential hygiene."
180
+ ),
181
+ host_id=host["id"] if host else None,
182
+ tool="evil_winrm",
183
+ )
184
+ elif warnings:
185
+ status = STATUS_WARNING
186
+ summary = warnings[0]
187
+ else:
188
+ status = STATUS_NO_RESULTS
189
+ summary = "No shell access (check credentials or connectivity)"
190
+
191
+ result = {
192
+ "tool": "evil_winrm",
193
+ "status": status,
194
+ "target": target,
195
+ "summary": summary,
196
+ "username": username,
197
+ "password": password,
198
+ "success": success_found,
199
+ "command_output": command_output,
200
+ "warnings": warnings,
201
+ }
202
+
203
+ # Add credentials for UI display when shell access succeeded
204
+ if success_found and username and password:
205
+ result["credentials"] = [
206
+ {
207
+ "username": username,
208
+ "password": password,
209
+ "service": "winrm",
210
+ "access": "shell",
211
+ }
212
+ ]
213
+
214
+ if error_found:
215
+ result["error"] = error_found
216
+
217
+ return result
218
+
219
+ except Exception as e:
220
+ logger.error(f"Error parsing evil_winrm job: {e}")
221
+ return {
222
+ "tool": "evil_winrm",
223
+ "status": STATUS_ERROR,
224
+ "summary": f"Parse error: {str(e)}",
225
+ "error": str(e),
226
+ }
227
+
228
+ def _extract_username(self, args) -> Optional[str]:
229
+ """Extract username from command arguments."""
230
+ if not args:
231
+ return None
232
+
233
+ # Handle list args
234
+ if isinstance(args, list):
235
+ for i, arg in enumerate(args):
236
+ if arg in ["-u", "--user"] and i + 1 < len(args):
237
+ return args[i + 1]
238
+ return None
239
+
240
+ # Handle string args
241
+ match = re.search(r"-u\s+([^\s]+)|--user\s+([^\s]+)", str(args))
242
+ if match:
243
+ return match.group(1) or match.group(2)
244
+ return None
245
+
246
+ def _extract_password(self, args) -> Optional[str]:
247
+ """Extract password from command arguments."""
248
+ if not args:
249
+ return None
250
+
251
+ # Handle list args
252
+ if isinstance(args, list):
253
+ for i, arg in enumerate(args):
254
+ if arg in ["-p", "--password"] and i + 1 < len(args):
255
+ return args[i + 1]
256
+ return None
257
+
258
+ # Handle string args
259
+ match = re.search(r"-p\s+([^\s]+)|--password\s+([^\s]+)", str(args))
260
+ if match:
261
+ return match.group(1) or match.group(2)
262
+ return None
263
+
264
+ def _extract_command_output(self, log_content: str) -> Optional[str]:
265
+ """Extract command output from Evil-WinRM session."""
266
+ # Look for PS prompt and capture output after it
267
+ lines = log_content.split("\n")
268
+ output_lines = []
269
+ capturing = False
270
+
271
+ for line in lines:
272
+ # Start capturing after PS prompt
273
+ if re.match(r"PS [A-Z]:\\", line) or "Data: PS" in line:
274
+ capturing = True
275
+ continue
276
+
277
+ # Stop at completion markers
278
+ if "Completed:" in line or "Exit Code:" in line:
279
+ break
280
+
281
+ if capturing and line.strip():
282
+ # Skip Evil-WinRM internal messages
283
+ if not any(x in line for x in ["*Evil-WinRM*", "Info:", "Data:"]):
284
+ output_lines.append(line)
285
+
286
+ return "\n".join(output_lines) if output_lines else None
287
+
288
+ def display_done(
289
+ self,
290
+ job: Dict[str, Any],
291
+ log_path: str,
292
+ show_all: bool = False,
293
+ show_passwords: bool = False,
294
+ ) -> None:
295
+ """Display successful Evil-WinRM results."""
296
+ try:
297
+ if not log_path or not os.path.exists(log_path):
298
+ return
299
+
300
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
301
+ log_content = f.read()
302
+
303
+ target = job.get("target", "unknown")
304
+ args = job.get("args", "")
305
+ username = self._extract_username(args)
306
+ command_output = self._extract_command_output(log_content)
307
+
308
+ click.echo(click.style("=" * 70, fg="green"))
309
+ click.echo(click.style("EVIL-WINRM SHELL ACCESS", bold=True, fg="green"))
310
+ click.echo(click.style("=" * 70, fg="green"))
311
+ click.echo()
312
+
313
+ click.echo(click.style(f"Target: {target}", bold=True))
314
+ if username:
315
+ click.echo(f"Username: {click.style(username, fg='yellow')}")
316
+ click.echo(f"Protocol: WinRM (Windows Remote Management)")
317
+ click.echo()
318
+
319
+ click.echo(click.style("Authentication successful!", fg="green", bold=True))
320
+ click.echo("Remote PowerShell access has been established.")
321
+ click.echo()
322
+
323
+ if command_output:
324
+ click.echo(click.style("Command Output:", bold=True))
325
+ click.echo(click.style("-" * 40, dim=True))
326
+ # Truncate long output
327
+ if len(command_output) > 2000 and not show_all:
328
+ click.echo(command_output[:2000])
329
+ click.echo(
330
+ click.style(
331
+ f"\n... (truncated, {len(command_output)} chars total)",
332
+ dim=True,
333
+ )
334
+ )
335
+ else:
336
+ click.echo(command_output)
337
+ click.echo(click.style("-" * 40, dim=True))
338
+ click.echo()
339
+
340
+ # Extract password for reconnect command
341
+ password = self._extract_password(args)
342
+
343
+ click.echo(click.style("Reconnect:", fg="yellow", bold=True))
344
+ if username and password:
345
+ click.echo(f" evil-winrm -i {target} -u '{username}' -p '{password}'")
346
+ else:
347
+ click.echo(f" evil-winrm -i {target} -u <user> -p <pass>")
348
+ click.echo()
349
+ click.echo(
350
+ click.style(
351
+ " TIP: Press [s] to spawn an interactive shell", fg="green"
352
+ )
353
+ )
354
+ click.echo()
355
+
356
+ click.echo(click.style("Post-Exploitation:", fg="cyan", bold=True))
357
+ click.echo(" - whoami /priv (check privileges)")
358
+ click.echo(" - systeminfo (system enumeration)")
359
+ click.echo(" - net user (local users)")
360
+ click.echo(" - net localgroup administrators")
361
+ click.echo()
362
+
363
+ click.echo(click.style("=" * 70, fg="green"))
364
+ click.echo()
365
+
366
+ except Exception as e:
367
+ logger.error(f"Error displaying evil_winrm results: {e}")
368
+
369
+ def display_error(
370
+ self,
371
+ job: Dict[str, Any],
372
+ log_path: str,
373
+ ) -> None:
374
+ """Display Evil-WinRM error."""
375
+ click.echo(click.style("=" * 70, fg="red"))
376
+ click.echo(click.style("[ERROR] EVIL-WINRM FAILED", bold=True, fg="red"))
377
+ click.echo(click.style("=" * 70, fg="red"))
378
+ click.echo()
379
+
380
+ target = job.get("target", "unknown")
381
+ click.echo(f"Target: {target}")
382
+ click.echo()
383
+
384
+ # Try to determine specific error
385
+ error_msg = None
386
+ if log_path and os.path.exists(log_path):
387
+ try:
388
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
389
+ log_content = f.read()
390
+
391
+ for pattern, message in self.ERROR_PATTERNS:
392
+ if re.search(pattern, log_content, re.IGNORECASE):
393
+ error_msg = message
394
+ break
395
+ except Exception:
396
+ pass
397
+
398
+ if error_msg:
399
+ click.echo(f" {error_msg}")
400
+ else:
401
+ click.echo(
402
+ " Authentication or connection failed - see raw logs for details"
403
+ )
404
+
405
+ click.echo()
406
+ click.echo(click.style("Troubleshooting:", fg="yellow"))
407
+ click.echo(" - Verify credentials are correct")
408
+ click.echo(" - Check if WinRM is enabled on target (port 5985/5986)")
409
+ click.echo(" - Try -s flag for SSL (port 5986)")
410
+ click.echo(" - Ensure network connectivity to target")
411
+ click.echo()
412
+
413
+ click.echo(click.style("=" * 70, fg="red"))
414
+ click.echo()
415
+
416
+ def display_warning(
417
+ self,
418
+ job: Dict[str, Any],
419
+ log_path: str,
420
+ ) -> None:
421
+ """Display Evil-WinRM warning."""
422
+ click.echo(click.style("=" * 70, fg="yellow"))
423
+ click.echo(
424
+ click.style("[WARNING] EVIL-WINRM CONNECTION ISSUE", bold=True, fg="yellow")
425
+ )
426
+ click.echo(click.style("=" * 70, fg="yellow"))
427
+ click.echo()
428
+
429
+ target = job.get("target", "unknown")
430
+ click.echo(f"Target: {target}")
431
+ click.echo()
432
+
433
+ # Try to determine specific warning
434
+ if log_path and os.path.exists(log_path):
435
+ try:
436
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
437
+ log_content = f.read()
438
+
439
+ for pattern, message in self.ERROR_PATTERNS:
440
+ if re.search(pattern, log_content, re.IGNORECASE):
441
+ click.echo(f" {message}")
442
+ break
443
+ except Exception:
444
+ click.echo(" Connection issue - target may be unreachable")
445
+
446
+ click.echo()
447
+ click.echo(click.style("Suggestions:", fg="cyan"))
448
+ click.echo(" - Verify target is online and WinRM port is open")
449
+ click.echo(" - Check firewall rules on target")
450
+ click.echo(" - Try alternate port (5985 vs 5986)")
451
+ click.echo()
452
+
453
+ click.echo(click.style("=" * 70, fg="yellow"))
454
+ click.echo()
455
+
456
+ def display_no_results(
457
+ self,
458
+ job: Dict[str, Any],
459
+ log_path: str,
460
+ ) -> None:
461
+ """Display Evil-WinRM no results."""
462
+ click.echo(click.style("=" * 70, fg="cyan"))
463
+ click.echo(click.style("EVIL-WINRM - NO ACCESS", bold=True, fg="cyan"))
464
+ click.echo(click.style("=" * 70, fg="cyan"))
465
+ click.echo()
466
+
467
+ target = job.get("target", "unknown")
468
+ click.echo(f"Target: {target}")
469
+ click.echo()
470
+
471
+ click.echo(" Could not establish WinRM shell access.")
472
+ click.echo()
473
+
474
+ click.echo(click.style("Common reasons:", fg="yellow"))
475
+ click.echo(" - Invalid credentials")
476
+ click.echo(" - WinRM not enabled on target")
477
+ click.echo(" - Firewall blocking WinRM ports")
478
+ click.echo(" - Account lockout or disabled")
479
+ click.echo(" - Insufficient privileges for WinRM")
480
+ click.echo()
481
+
482
+ click.echo(click.style("Try:", fg="cyan"))
483
+ click.echo(" - Verify credentials work with other tools (CME, smbclient)")
484
+ click.echo(" - Check if WinRM is enabled: nmap -p 5985,5986 <target>")
485
+ click.echo(" - Try psexec as alternative for shell access")
486
+ click.echo()
487
+
488
+ click.echo(click.style("=" * 70, fg="cyan"))
489
+ click.echo()
490
+
491
+
492
+ # Register handler
493
+ handler = EvilWinRMHandler()