souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of souleyez might be problematic. Click here for more details.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9526 -2879
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +563 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +408 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +371 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +854 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +173 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +223 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +23434 -10286
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
- souleyez-2.43.34.dist-info/RECORD +443 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
- souleyez-2.43.26.dist-info/RECORD +0 -379
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,493 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Evil-WinRM handler.
|
|
4
|
+
|
|
5
|
+
Consolidates parsing and display logic for Evil-WinRM jobs.
|
|
6
|
+
"""
|
|
7
|
+
import logging
|
|
8
|
+
import os
|
|
9
|
+
import re
|
|
10
|
+
from typing import Any, Dict, Optional
|
|
11
|
+
|
|
12
|
+
import click
|
|
13
|
+
|
|
14
|
+
from souleyez.engine.job_status import (
|
|
15
|
+
STATUS_DONE,
|
|
16
|
+
STATUS_ERROR,
|
|
17
|
+
STATUS_NO_RESULTS,
|
|
18
|
+
STATUS_WARNING,
|
|
19
|
+
)
|
|
20
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
21
|
+
|
|
22
|
+
logger = logging.getLogger(__name__)
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
class EvilWinRMHandler(BaseToolHandler):
|
|
26
|
+
"""Handler for Evil-WinRM remote shell jobs."""
|
|
27
|
+
|
|
28
|
+
tool_name = "evil_winrm"
|
|
29
|
+
display_name = "Evil-WinRM"
|
|
30
|
+
|
|
31
|
+
# All handlers enabled
|
|
32
|
+
has_error_handler = True
|
|
33
|
+
has_warning_handler = True
|
|
34
|
+
has_no_results_handler = True
|
|
35
|
+
has_done_handler = True
|
|
36
|
+
|
|
37
|
+
# Capability flags
|
|
38
|
+
extracts_credentials = False # Could extract creds from command output
|
|
39
|
+
extracts_findings = True
|
|
40
|
+
extracts_services = False
|
|
41
|
+
supports_chaining = True
|
|
42
|
+
|
|
43
|
+
# Success patterns - indicates successful authentication
|
|
44
|
+
SUCCESS_PATTERNS = [
|
|
45
|
+
r"Evil-WinRM shell",
|
|
46
|
+
r"\*Evil-WinRM\*",
|
|
47
|
+
r"PS [A-Z]:\\",
|
|
48
|
+
r"Info: Establishing connection",
|
|
49
|
+
r"Data: PS ",
|
|
50
|
+
]
|
|
51
|
+
|
|
52
|
+
# Error patterns
|
|
53
|
+
ERROR_PATTERNS = [
|
|
54
|
+
(
|
|
55
|
+
r"WinRM::WinRMAuthorizationError",
|
|
56
|
+
"User not authorized for WinRM (credentials may be valid for SMB)",
|
|
57
|
+
),
|
|
58
|
+
(r"Access is denied", "Access denied (insufficient privileges)"),
|
|
59
|
+
(r"getaddrinfo: Name or service not known", "DNS resolution failed"),
|
|
60
|
+
(r"Connection refused", "Connection refused (WinRM not running)"),
|
|
61
|
+
(r"Connection timed out|Errno::ETIMEDOUT", "Connection timed out"),
|
|
62
|
+
(r"No route to host", "No route to host"),
|
|
63
|
+
(r"Network is unreachable", "Network unreachable"),
|
|
64
|
+
(r"SSL_connect", "SSL/TLS error (try -s for SSL or check port)"),
|
|
65
|
+
(r"Bad HTTP response", "Bad HTTP response (wrong port or service)"),
|
|
66
|
+
(r"WinRM::WinRMHTTPTransportError", "HTTP transport error"),
|
|
67
|
+
(r"WinRM::WinRMWSManFault", "WSMan fault (check WinRM config)"),
|
|
68
|
+
]
|
|
69
|
+
|
|
70
|
+
# Warning patterns (partial success or non-critical issues)
|
|
71
|
+
WARNING_PATTERNS = [
|
|
72
|
+
(r"Warning:", "Warning encountered during execution"),
|
|
73
|
+
(r"Access denied to", "Access denied to specific resource"),
|
|
74
|
+
]
|
|
75
|
+
|
|
76
|
+
def parse_job(
|
|
77
|
+
self,
|
|
78
|
+
engagement_id: int,
|
|
79
|
+
log_path: str,
|
|
80
|
+
job: Dict[str, Any],
|
|
81
|
+
host_manager: Optional[Any] = None,
|
|
82
|
+
findings_manager: Optional[Any] = None,
|
|
83
|
+
credentials_manager: Optional[Any] = None,
|
|
84
|
+
) -> Dict[str, Any]:
|
|
85
|
+
"""
|
|
86
|
+
Parse Evil-WinRM job results.
|
|
87
|
+
|
|
88
|
+
Determines if authentication succeeded and extracts command output.
|
|
89
|
+
"""
|
|
90
|
+
try:
|
|
91
|
+
# Import managers if not provided
|
|
92
|
+
if host_manager is None:
|
|
93
|
+
from souleyez.storage.hosts import HostManager
|
|
94
|
+
|
|
95
|
+
host_manager = HostManager()
|
|
96
|
+
if findings_manager is None:
|
|
97
|
+
from souleyez.storage.findings import FindingsManager
|
|
98
|
+
|
|
99
|
+
findings_manager = FindingsManager()
|
|
100
|
+
|
|
101
|
+
# Read the log file
|
|
102
|
+
if not os.path.exists(log_path):
|
|
103
|
+
return {
|
|
104
|
+
"tool": "evil_winrm",
|
|
105
|
+
"status": STATUS_ERROR,
|
|
106
|
+
"summary": "Log file not found",
|
|
107
|
+
"error": "Log file not found",
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
111
|
+
log_content = f.read()
|
|
112
|
+
|
|
113
|
+
target = job.get("target", "")
|
|
114
|
+
|
|
115
|
+
# Extract username and password from args if present
|
|
116
|
+
args = job.get("args", [])
|
|
117
|
+
username = self._extract_username(args)
|
|
118
|
+
password = self._extract_password(args)
|
|
119
|
+
|
|
120
|
+
# Check for errors first
|
|
121
|
+
error_found = None
|
|
122
|
+
for pattern, message in self.ERROR_PATTERNS:
|
|
123
|
+
if re.search(pattern, log_content, re.IGNORECASE):
|
|
124
|
+
error_found = message
|
|
125
|
+
break
|
|
126
|
+
|
|
127
|
+
# Check for success patterns
|
|
128
|
+
success_found = False
|
|
129
|
+
for pattern in self.SUCCESS_PATTERNS:
|
|
130
|
+
if re.search(pattern, log_content, re.IGNORECASE):
|
|
131
|
+
success_found = True
|
|
132
|
+
break
|
|
133
|
+
|
|
134
|
+
# Extract command output if present
|
|
135
|
+
command_output = self._extract_command_output(log_content)
|
|
136
|
+
|
|
137
|
+
# Check for warnings
|
|
138
|
+
warnings = []
|
|
139
|
+
for pattern, message in self.WARNING_PATTERNS:
|
|
140
|
+
if re.search(pattern, log_content, re.IGNORECASE):
|
|
141
|
+
warnings.append(message)
|
|
142
|
+
|
|
143
|
+
# Determine status
|
|
144
|
+
if error_found:
|
|
145
|
+
# Check if it's a connection error vs auth error
|
|
146
|
+
if any(
|
|
147
|
+
x in error_found.lower()
|
|
148
|
+
for x in ["connection", "route", "network", "dns", "timed out"]
|
|
149
|
+
):
|
|
150
|
+
status = STATUS_WARNING
|
|
151
|
+
summary = f"Connection failed: {error_found}"
|
|
152
|
+
else:
|
|
153
|
+
status = STATUS_ERROR
|
|
154
|
+
summary = error_found
|
|
155
|
+
elif success_found:
|
|
156
|
+
status = STATUS_DONE
|
|
157
|
+
summary = f"WinRM shell access gained"
|
|
158
|
+
if username:
|
|
159
|
+
summary += f" as {username}"
|
|
160
|
+
|
|
161
|
+
# Add finding for successful WinRM access
|
|
162
|
+
host = host_manager.get_host_by_ip(engagement_id, target)
|
|
163
|
+
if not host:
|
|
164
|
+
host = host_manager.add_or_update_host(
|
|
165
|
+
engagement_id, {"ip": target, "status": "up"}
|
|
166
|
+
)
|
|
167
|
+
|
|
168
|
+
findings_manager.add_finding(
|
|
169
|
+
engagement_id=engagement_id,
|
|
170
|
+
title=f"WinRM Shell Access - {target}",
|
|
171
|
+
finding_type="access",
|
|
172
|
+
severity="critical",
|
|
173
|
+
description=(
|
|
174
|
+
f"Evil-WinRM successfully authenticated to {target} over WinRM.\n\n"
|
|
175
|
+
f"Username: {username or 'unknown'}\n\n"
|
|
176
|
+
f"This provides remote PowerShell access to the target system, "
|
|
177
|
+
f"allowing command execution, file transfer, and potential "
|
|
178
|
+
f"privilege escalation.\n\n"
|
|
179
|
+
f"Recommendation: Review WinRM access controls and credential hygiene."
|
|
180
|
+
),
|
|
181
|
+
host_id=host["id"] if host else None,
|
|
182
|
+
tool="evil_winrm",
|
|
183
|
+
)
|
|
184
|
+
elif warnings:
|
|
185
|
+
status = STATUS_WARNING
|
|
186
|
+
summary = warnings[0]
|
|
187
|
+
else:
|
|
188
|
+
status = STATUS_NO_RESULTS
|
|
189
|
+
summary = "No shell access (check credentials or connectivity)"
|
|
190
|
+
|
|
191
|
+
result = {
|
|
192
|
+
"tool": "evil_winrm",
|
|
193
|
+
"status": status,
|
|
194
|
+
"target": target,
|
|
195
|
+
"summary": summary,
|
|
196
|
+
"username": username,
|
|
197
|
+
"password": password,
|
|
198
|
+
"success": success_found,
|
|
199
|
+
"command_output": command_output,
|
|
200
|
+
"warnings": warnings,
|
|
201
|
+
}
|
|
202
|
+
|
|
203
|
+
# Add credentials for UI display when shell access succeeded
|
|
204
|
+
if success_found and username and password:
|
|
205
|
+
result["credentials"] = [
|
|
206
|
+
{
|
|
207
|
+
"username": username,
|
|
208
|
+
"password": password,
|
|
209
|
+
"service": "winrm",
|
|
210
|
+
"access": "shell",
|
|
211
|
+
}
|
|
212
|
+
]
|
|
213
|
+
|
|
214
|
+
if error_found:
|
|
215
|
+
result["error"] = error_found
|
|
216
|
+
|
|
217
|
+
return result
|
|
218
|
+
|
|
219
|
+
except Exception as e:
|
|
220
|
+
logger.error(f"Error parsing evil_winrm job: {e}")
|
|
221
|
+
return {
|
|
222
|
+
"tool": "evil_winrm",
|
|
223
|
+
"status": STATUS_ERROR,
|
|
224
|
+
"summary": f"Parse error: {str(e)}",
|
|
225
|
+
"error": str(e),
|
|
226
|
+
}
|
|
227
|
+
|
|
228
|
+
def _extract_username(self, args) -> Optional[str]:
|
|
229
|
+
"""Extract username from command arguments."""
|
|
230
|
+
if not args:
|
|
231
|
+
return None
|
|
232
|
+
|
|
233
|
+
# Handle list args
|
|
234
|
+
if isinstance(args, list):
|
|
235
|
+
for i, arg in enumerate(args):
|
|
236
|
+
if arg in ["-u", "--user"] and i + 1 < len(args):
|
|
237
|
+
return args[i + 1]
|
|
238
|
+
return None
|
|
239
|
+
|
|
240
|
+
# Handle string args
|
|
241
|
+
match = re.search(r"-u\s+([^\s]+)|--user\s+([^\s]+)", str(args))
|
|
242
|
+
if match:
|
|
243
|
+
return match.group(1) or match.group(2)
|
|
244
|
+
return None
|
|
245
|
+
|
|
246
|
+
def _extract_password(self, args) -> Optional[str]:
|
|
247
|
+
"""Extract password from command arguments."""
|
|
248
|
+
if not args:
|
|
249
|
+
return None
|
|
250
|
+
|
|
251
|
+
# Handle list args
|
|
252
|
+
if isinstance(args, list):
|
|
253
|
+
for i, arg in enumerate(args):
|
|
254
|
+
if arg in ["-p", "--password"] and i + 1 < len(args):
|
|
255
|
+
return args[i + 1]
|
|
256
|
+
return None
|
|
257
|
+
|
|
258
|
+
# Handle string args
|
|
259
|
+
match = re.search(r"-p\s+([^\s]+)|--password\s+([^\s]+)", str(args))
|
|
260
|
+
if match:
|
|
261
|
+
return match.group(1) or match.group(2)
|
|
262
|
+
return None
|
|
263
|
+
|
|
264
|
+
def _extract_command_output(self, log_content: str) -> Optional[str]:
|
|
265
|
+
"""Extract command output from Evil-WinRM session."""
|
|
266
|
+
# Look for PS prompt and capture output after it
|
|
267
|
+
lines = log_content.split("\n")
|
|
268
|
+
output_lines = []
|
|
269
|
+
capturing = False
|
|
270
|
+
|
|
271
|
+
for line in lines:
|
|
272
|
+
# Start capturing after PS prompt
|
|
273
|
+
if re.match(r"PS [A-Z]:\\", line) or "Data: PS" in line:
|
|
274
|
+
capturing = True
|
|
275
|
+
continue
|
|
276
|
+
|
|
277
|
+
# Stop at completion markers
|
|
278
|
+
if "Completed:" in line or "Exit Code:" in line:
|
|
279
|
+
break
|
|
280
|
+
|
|
281
|
+
if capturing and line.strip():
|
|
282
|
+
# Skip Evil-WinRM internal messages
|
|
283
|
+
if not any(x in line for x in ["*Evil-WinRM*", "Info:", "Data:"]):
|
|
284
|
+
output_lines.append(line)
|
|
285
|
+
|
|
286
|
+
return "\n".join(output_lines) if output_lines else None
|
|
287
|
+
|
|
288
|
+
def display_done(
|
|
289
|
+
self,
|
|
290
|
+
job: Dict[str, Any],
|
|
291
|
+
log_path: str,
|
|
292
|
+
show_all: bool = False,
|
|
293
|
+
show_passwords: bool = False,
|
|
294
|
+
) -> None:
|
|
295
|
+
"""Display successful Evil-WinRM results."""
|
|
296
|
+
try:
|
|
297
|
+
if not log_path or not os.path.exists(log_path):
|
|
298
|
+
return
|
|
299
|
+
|
|
300
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
301
|
+
log_content = f.read()
|
|
302
|
+
|
|
303
|
+
target = job.get("target", "unknown")
|
|
304
|
+
args = job.get("args", "")
|
|
305
|
+
username = self._extract_username(args)
|
|
306
|
+
command_output = self._extract_command_output(log_content)
|
|
307
|
+
|
|
308
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
309
|
+
click.echo(click.style("EVIL-WINRM SHELL ACCESS", bold=True, fg="green"))
|
|
310
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
311
|
+
click.echo()
|
|
312
|
+
|
|
313
|
+
click.echo(click.style(f"Target: {target}", bold=True))
|
|
314
|
+
if username:
|
|
315
|
+
click.echo(f"Username: {click.style(username, fg='yellow')}")
|
|
316
|
+
click.echo(f"Protocol: WinRM (Windows Remote Management)")
|
|
317
|
+
click.echo()
|
|
318
|
+
|
|
319
|
+
click.echo(click.style("Authentication successful!", fg="green", bold=True))
|
|
320
|
+
click.echo("Remote PowerShell access has been established.")
|
|
321
|
+
click.echo()
|
|
322
|
+
|
|
323
|
+
if command_output:
|
|
324
|
+
click.echo(click.style("Command Output:", bold=True))
|
|
325
|
+
click.echo(click.style("-" * 40, dim=True))
|
|
326
|
+
# Truncate long output
|
|
327
|
+
if len(command_output) > 2000 and not show_all:
|
|
328
|
+
click.echo(command_output[:2000])
|
|
329
|
+
click.echo(
|
|
330
|
+
click.style(
|
|
331
|
+
f"\n... (truncated, {len(command_output)} chars total)",
|
|
332
|
+
dim=True,
|
|
333
|
+
)
|
|
334
|
+
)
|
|
335
|
+
else:
|
|
336
|
+
click.echo(command_output)
|
|
337
|
+
click.echo(click.style("-" * 40, dim=True))
|
|
338
|
+
click.echo()
|
|
339
|
+
|
|
340
|
+
# Extract password for reconnect command
|
|
341
|
+
password = self._extract_password(args)
|
|
342
|
+
|
|
343
|
+
click.echo(click.style("Reconnect:", fg="yellow", bold=True))
|
|
344
|
+
if username and password:
|
|
345
|
+
click.echo(f" evil-winrm -i {target} -u '{username}' -p '{password}'")
|
|
346
|
+
else:
|
|
347
|
+
click.echo(f" evil-winrm -i {target} -u <user> -p <pass>")
|
|
348
|
+
click.echo()
|
|
349
|
+
click.echo(
|
|
350
|
+
click.style(
|
|
351
|
+
" TIP: Press [s] to spawn an interactive shell", fg="green"
|
|
352
|
+
)
|
|
353
|
+
)
|
|
354
|
+
click.echo()
|
|
355
|
+
|
|
356
|
+
click.echo(click.style("Post-Exploitation:", fg="cyan", bold=True))
|
|
357
|
+
click.echo(" - whoami /priv (check privileges)")
|
|
358
|
+
click.echo(" - systeminfo (system enumeration)")
|
|
359
|
+
click.echo(" - net user (local users)")
|
|
360
|
+
click.echo(" - net localgroup administrators")
|
|
361
|
+
click.echo()
|
|
362
|
+
|
|
363
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
364
|
+
click.echo()
|
|
365
|
+
|
|
366
|
+
except Exception as e:
|
|
367
|
+
logger.error(f"Error displaying evil_winrm results: {e}")
|
|
368
|
+
|
|
369
|
+
def display_error(
|
|
370
|
+
self,
|
|
371
|
+
job: Dict[str, Any],
|
|
372
|
+
log_path: str,
|
|
373
|
+
) -> None:
|
|
374
|
+
"""Display Evil-WinRM error."""
|
|
375
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
376
|
+
click.echo(click.style("[ERROR] EVIL-WINRM FAILED", bold=True, fg="red"))
|
|
377
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
378
|
+
click.echo()
|
|
379
|
+
|
|
380
|
+
target = job.get("target", "unknown")
|
|
381
|
+
click.echo(f"Target: {target}")
|
|
382
|
+
click.echo()
|
|
383
|
+
|
|
384
|
+
# Try to determine specific error
|
|
385
|
+
error_msg = None
|
|
386
|
+
if log_path and os.path.exists(log_path):
|
|
387
|
+
try:
|
|
388
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
389
|
+
log_content = f.read()
|
|
390
|
+
|
|
391
|
+
for pattern, message in self.ERROR_PATTERNS:
|
|
392
|
+
if re.search(pattern, log_content, re.IGNORECASE):
|
|
393
|
+
error_msg = message
|
|
394
|
+
break
|
|
395
|
+
except Exception:
|
|
396
|
+
pass
|
|
397
|
+
|
|
398
|
+
if error_msg:
|
|
399
|
+
click.echo(f" {error_msg}")
|
|
400
|
+
else:
|
|
401
|
+
click.echo(
|
|
402
|
+
" Authentication or connection failed - see raw logs for details"
|
|
403
|
+
)
|
|
404
|
+
|
|
405
|
+
click.echo()
|
|
406
|
+
click.echo(click.style("Troubleshooting:", fg="yellow"))
|
|
407
|
+
click.echo(" - Verify credentials are correct")
|
|
408
|
+
click.echo(" - Check if WinRM is enabled on target (port 5985/5986)")
|
|
409
|
+
click.echo(" - Try -s flag for SSL (port 5986)")
|
|
410
|
+
click.echo(" - Ensure network connectivity to target")
|
|
411
|
+
click.echo()
|
|
412
|
+
|
|
413
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
414
|
+
click.echo()
|
|
415
|
+
|
|
416
|
+
def display_warning(
|
|
417
|
+
self,
|
|
418
|
+
job: Dict[str, Any],
|
|
419
|
+
log_path: str,
|
|
420
|
+
) -> None:
|
|
421
|
+
"""Display Evil-WinRM warning."""
|
|
422
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
423
|
+
click.echo(
|
|
424
|
+
click.style("[WARNING] EVIL-WINRM CONNECTION ISSUE", bold=True, fg="yellow")
|
|
425
|
+
)
|
|
426
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
427
|
+
click.echo()
|
|
428
|
+
|
|
429
|
+
target = job.get("target", "unknown")
|
|
430
|
+
click.echo(f"Target: {target}")
|
|
431
|
+
click.echo()
|
|
432
|
+
|
|
433
|
+
# Try to determine specific warning
|
|
434
|
+
if log_path and os.path.exists(log_path):
|
|
435
|
+
try:
|
|
436
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
437
|
+
log_content = f.read()
|
|
438
|
+
|
|
439
|
+
for pattern, message in self.ERROR_PATTERNS:
|
|
440
|
+
if re.search(pattern, log_content, re.IGNORECASE):
|
|
441
|
+
click.echo(f" {message}")
|
|
442
|
+
break
|
|
443
|
+
except Exception:
|
|
444
|
+
click.echo(" Connection issue - target may be unreachable")
|
|
445
|
+
|
|
446
|
+
click.echo()
|
|
447
|
+
click.echo(click.style("Suggestions:", fg="cyan"))
|
|
448
|
+
click.echo(" - Verify target is online and WinRM port is open")
|
|
449
|
+
click.echo(" - Check firewall rules on target")
|
|
450
|
+
click.echo(" - Try alternate port (5985 vs 5986)")
|
|
451
|
+
click.echo()
|
|
452
|
+
|
|
453
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
454
|
+
click.echo()
|
|
455
|
+
|
|
456
|
+
def display_no_results(
|
|
457
|
+
self,
|
|
458
|
+
job: Dict[str, Any],
|
|
459
|
+
log_path: str,
|
|
460
|
+
) -> None:
|
|
461
|
+
"""Display Evil-WinRM no results."""
|
|
462
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
463
|
+
click.echo(click.style("EVIL-WINRM - NO ACCESS", bold=True, fg="cyan"))
|
|
464
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
465
|
+
click.echo()
|
|
466
|
+
|
|
467
|
+
target = job.get("target", "unknown")
|
|
468
|
+
click.echo(f"Target: {target}")
|
|
469
|
+
click.echo()
|
|
470
|
+
|
|
471
|
+
click.echo(" Could not establish WinRM shell access.")
|
|
472
|
+
click.echo()
|
|
473
|
+
|
|
474
|
+
click.echo(click.style("Common reasons:", fg="yellow"))
|
|
475
|
+
click.echo(" - Invalid credentials")
|
|
476
|
+
click.echo(" - WinRM not enabled on target")
|
|
477
|
+
click.echo(" - Firewall blocking WinRM ports")
|
|
478
|
+
click.echo(" - Account lockout or disabled")
|
|
479
|
+
click.echo(" - Insufficient privileges for WinRM")
|
|
480
|
+
click.echo()
|
|
481
|
+
|
|
482
|
+
click.echo(click.style("Try:", fg="cyan"))
|
|
483
|
+
click.echo(" - Verify credentials work with other tools (CME, smbclient)")
|
|
484
|
+
click.echo(" - Check if WinRM is enabled: nmap -p 5985,5986 <target>")
|
|
485
|
+
click.echo(" - Try psexec as alternative for shell access")
|
|
486
|
+
click.echo()
|
|
487
|
+
|
|
488
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
489
|
+
click.echo()
|
|
490
|
+
|
|
491
|
+
|
|
492
|
+
# Register handler
|
|
493
|
+
handler = EvilWinRMHandler()
|