Windows Servers Can Expose PowerShell on the Web

Поделиться
HTML-код
  • Опубликовано: 20 ноя 2024

Комментарии •

  • @Jamesthe1
    @Jamesthe1 Месяц назад +34

    Just casually drops "by the way I used to work there" like it's a casual Tuesday took me a little off guard I'll be honest

  • @ai-spacedestructor
    @ai-spacedestructor Месяц назад +19

    feels to me like its an integrated part of powershell that microsoft forgot about so any time they bring out a new server they just take powershell as it is and make the changes to the code they want to make, which leads to this feature not being touched since server 2016 and thats probably why the string is hard coded, it probably wasnt meant to carry over for this long.

    • @Mario583a
      @Mario583a Месяц назад

      It's not as if Microsoft forgot, it's just that they did not anticipate that this unknown vector of attack could be exploited.

  • @TomAtkinson
    @TomAtkinson Месяц назад +3

    I'm glad you're amused by it. I was amused watching Windows admins login to GUI sessions via RDP for the firs time a million years ago and being blown away there was no way to reboot a server. Well, I guess now there is a way... Webshells? Support PKI or pubkeys? Last time I tried to reboot a Wintendo box all I could see was "Log-out..." so I had to walk over instead and tap the power button.

  • @nullpwn
    @nullpwn Месяц назад +34

    new attack vectors lets gooo

  • @Maxjoker98
    @Maxjoker98 Месяц назад +5

    I have Bash CGI script that acts as a more competent web shell. I can actually stream events using the Server-sent events/EventSource mechanism.
    I Built it for my server control panel, but would also be a good web shell, as it has no dependencies other than a CGI-capable web server and Bash.

  • @cmarines7
    @cmarines7 Месяц назад +5

    Learned so much from you which had inspired me to learn more on cybersecurity. Thanks

  • @kengonzo1640
    @kengonzo1640 Месяц назад +3

    New video released, new video watched. Best way to start the Monday morning thanks for the content

  • @jussiheino
    @jussiheino 15 дней назад

    Much safer to use than the telnet server Windows NTs used to have!
    What's the fuss PSWA has to enabled by admin on purpose, like sshd.

  • @virtualgrowhouse
    @virtualgrowhouse 22 дня назад

    You just helped me in ways you will never know unless I become famous thank you

  • @corenb
    @corenb Месяц назад +2

    This is interesting, but if a threat actor had access to a local admin account, is Powershell not just one of many things they could access remotely?

  • @KvapuJanjalia
    @KvapuJanjalia Месяц назад +18

    Oh, no! If you are an administrator you can do anything! So, anyway...

    • @Mario583a
      @Mario583a Месяц назад

      *cough* Linux.

    • @proxgs7703
      @proxgs7703 Месяц назад +12

      This is not a vuln but a clever attack vector where you can hide in plain sight. Your web shell now looks legit unlike other type of web shells.

    • @iamwitchergeraltofrivia9670
      @iamwitchergeraltofrivia9670 Месяц назад

      Hahhahaaahha microsoft says is normal

    • @PsychEngel
      @PsychEngel Месяц назад

      ​@@iamwitchergeraltofrivia9670 Like SSH server on Linux? If I'm root on Linux, I can run sshd and I've setup a remoteshell with full access to the system and if I change some settings I don't even need to use a password to login, also I don't need to setup and webserver, which could be a hint, that the system is compromised.
      Sry, but Linux is way more unsecure, then windows, because you need administrator/root access on windows, so this isn't a vulnerability at all.
      On Linux, SSH server is enabled by default (or was, I'm not quite sure, but RHEL 9 definitely has it enabled by default!) and by default the integrated firewall was also disabled. I'm pretty sure, that most Linux distros never enabled the firewall by default, like Windows does it since it has a firewall integrated. Nowdays they enabled the firewall, but also open the SSH server by default, so you've exposed a root shell to the internet, without any interaction, whatsoever from the user..🎉

  • @starling-
    @starling- Месяц назад +7

    How this "vulnerability" is different from exposing RDP port ? It's basically the same logic. Anyway, you should not do this.

  • @svettnabb
    @svettnabb Месяц назад

    It's normal windows domain login behavior, host is always hostname not IP. You could do just .\username which automatically prefixes the computers hostname, or you could do localhost\

  • @Speed0a
    @Speed0a Месяц назад +9

    It's like Enter-PSSession. But for web?

    • @Alfred-Neuman
      @Alfred-Neuman Месяц назад

      I just verified with Microsoft and Powershell is not even a virus, apparently it is a perfectly normal feature inside Windows.
      People are so paranoid these days...

    • @PsychEngel
      @PsychEngel Месяц назад +2

      It's like ssh, but you've to be administrator on the windows machine, you've to install two separate packages, which aren't installed by default, like on Linux!!!!

  • @GeNNerIC69
    @GeNNerIC69 Месяц назад +1

    I'm i right in thinking this feature is not enabled by default ? - therefore someone would need to install and setup this role and allow access through a security device ( firewall, proxy etc ) ... which case one would assume this is no other flaw than anything elts ? - if you have installed, setup, and exsposed this - just like a webserver, PBX etc etc - your bed bud ... anyways - MS Azure is mostly remote powershell ? --- cheers :)

  • @애옹이도둑
    @애옹이도둑 День назад

    I'm not sure what the problem with this video is. If you're using HTTPS with a proper certificate, there's no need to worry about MITM, right? And if someone who knows the server admin details leaves the company, of course, you'd update the server account credentials. Did the PowerShell web server do anything wrong here?

  • @jcugnoni
    @jcugnoni 27 дней назад

    So if I understand well, you need at first local access with admin rights to setup PSWA and then to login you need a valid account... At this stage you already own the network before you can use that feature no? Here you don't exploit anything.

  • @achepta
    @achepta Месяц назад +1

    Hey John, do you remember the Apex Legends Hacker Destroyer2009 aka timoxa?
    It seems he discovered yet another 0-day related to anticheat recently. Could you cover this topic, please?

  • @k.chriscaldwell4141
    @k.chriscaldwell4141 Месяц назад

    The NSA’s not gonna be happy you found it.

  • @Cygerette
    @Cygerette 26 дней назад

    BTW, Love your work!

  • @AkiAfroo
    @AkiAfroo Месяц назад +1

    a post in reddit:
    "PowerShell Web Access: What could possibly go wrong?"
    12y ago. xD , thx microsoft.

  • @DaakuPlays
    @DaakuPlays Месяц назад

    How would i get credentials a bug bounty setup?

  • @nigellawrence7173
    @nigellawrence7173 14 дней назад

    love the learning

  • @JonathanSwiftUK
    @JonathanSwiftUK Месяц назад +1

    A somewhat pointless feature, admins will administer Windows servers from .... another Windows server, using Invoke, or Enable-PSSession, or WMI or WinRM, no need for this odd feature. And for WinRM you can restrict which machines can connect. I'd never install this, or use it. Imagine having IIS on every Windows box - a significant increase in the attack surface.

  • @annorome
    @annorome Месяц назад +1

    Is this really a recent topic? I knew that this is a potential hazard when I was working with it as a student for a company with no motivation & know-how to try and confirm my suspicions. But surely security researches would have caught up on this much earlier, no? A bit strange that only now it seems to have gained attention. Another channel, for which the US discovered that not only their agencies knew about it and used it - and thus are now making it public. Because the gain does not outweight the cost. The whole Azure Webshell for example reeked of potential abuse.

  • @D0mie7
    @D0mie7 29 дней назад

    I just block PS on my firewall and unblock it when I need it (like Chris Titus' program) xD

  • @Cygerette
    @Cygerette 26 дней назад

    John, did I see you in a video on another channel dressed in a military uniform? It was a short video?

  • @bhag47
    @bhag47 Месяц назад +1

    Time to back in 🎃

  • @Lelines0
    @Lelines0 Месяц назад +2

    Is it really any worse than having SSH enabled on a server that has exposure to the internet?

    • @itssardine5351
      @itssardine5351 Месяц назад +1

      I’m kind of lost, doesn’t every vps machine have its ssh port open to the internet tho?

    • @PsychEngel
      @PsychEngel Месяц назад

      No, it's not half as worse, as SSH!
      1. The SSH server is enabled on nearly any Linux distribution out there.
      2. If the distribution has it's firewall enabled (not all have/had them enabled or installed), then sshd is open by default.
      3. On Windows, you've to enable explicit two packages/features with administrator access.
      4. You've to use credentials on Windows, you can't access the server without a password or any other sort auf authentication.
      5. On Linux, I've to change one setting and I don't even need a password or any other authentication, besides the username.
      If you get this points and compare them side by side, then Linux is obviously way more insecure, since you already need administrator access to the machine. As an attacker, this is nearly never the case they start, so all of the points aren't valid at all!
      If it is, then most, if not all Linux distributions are definitely insecure by itself and can't be more secure then windows, which has an built-in firewall, which is activated and configured by default and is way more restrict, then the default firewall on Linux, if it's configured at all...

    • @mgord9518
      @mgord9518 29 дней назад +2

      ​@@PsychEngelNice bullshit dump. 1: Almost all Linux distros require installing SSH. 2: Yes... because you need it open to use SSH. 3 and 4: ? Since when can you access a Linux server without authentication? 5: Again, what? All system software requires root privileges to modify
      Leave it to an incompetent Windows admin to talk about how "insecure" Linux is.

    • @johnsmith8981
      @johnsmith8981 29 дней назад

      ​@@mgord9518also even if it was true, for both Windows and Linux you have to open the port in your router still.

  • @nigellawrence7173
    @nigellawrence7173 14 дней назад

    smiles informative

  • @vipshnu
    @vipshnu Месяц назад +2

    How fast will MS fix the website to say Windows 2022 🤪

  • @nigellawrence7173
    @nigellawrence7173 14 дней назад

    i casually like steaks

  • @chancymzama7478
    @chancymzama7478 Месяц назад

    wow. this is great

  • @hesa4196
    @hesa4196 23 дня назад

    60hz screen

  • @catcatcatcatcatcatcatcatcatca
    @catcatcatcatcatcatcatcatcatca Месяц назад +2

    I actually feel like this, or at least the original article/tweets is clickbait. It’s a server. You had the local admin account, reconfigured the policy, and the policy works as expected.
    As long as it is visible in the event log as a remote login, I fail to see how this is a backdoor any more than other methods.
    Does it use a different, unmonitored port? Even then, the attacker already has local admin privileges, there is nothing stopping them from setting up a RAT in any way they want. Reverse connection would be so much harder to detect as well.
    They instead (translating to linux) enabled root-login and configured either webshell or ssh to allow it from any source. They already had complete control over the host (in the demo they already had privileges on the hypervisor… ). So they just wrote a policy and used it as it was written. The host was not protected by a domain firewall given they can reach it with inbound connection.
    Like seriously. This is like calling SSH or RDP a backdoor, because they excist. Someone could use them for remote connections!

  • @carsonjamesiv2512
    @carsonjamesiv2512 Месяц назад

    This is COOL!😃👍

  • @RandomytchannelGD
    @RandomytchannelGD Месяц назад

    Hi

  • @monkaSisLife
    @monkaSisLife Месяц назад +2

    what a nothingburger video

  • @Hartley94
    @Hartley94 Месяц назад

    👏

  • @rene291
    @rene291 Месяц назад

    i think microsoft needs to overhaul windows server platform, because this showing as a feature of windows server 2016 is simply laziness.

  • @attribute-4677
    @attribute-4677 Месяц назад

    You need new thumbnail ideas.

  • @nigellawrence7173
    @nigellawrence7173 14 дней назад

    share

  • @KhongBerngLearch
    @KhongBerngLearch Месяц назад

    Idol

  • @PandaJP77
    @PandaJP77 Месяц назад

    Free undetectable web shell 😂😂 thank you Microsoft

  • @itzbenplaiz
    @itzbenplaiz Месяц назад

    E