Windows Servers Can Expose PowerShell on the Web

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024
  • jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk
    Learn Cybersecurity with Just Hacking Training: justhacking.com
    www.cisa.gov/n...
    x.com/M_haggis...
    x.com/M_haggis...
    www.splunk.com...
    gist.github.co...
    Learn Coding: jh.live/codecr...
    Don't listen to other "influencer" VPN crap -- host YOUR OWN: jh.live/openvpn
    WATCH MORE:
    Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
    Malware & Hacker Tradecraft: • Malware Analysis & Thr...
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 50

  • @Jamesthe1
    @Jamesthe1 13 часов назад +8

    Just casually drops "by the way I used to work there" like it's a casual Tuesday took me a little off guard I'll be honest

  • @ai-spacedestructor
    @ai-spacedestructor 19 часов назад +13

    feels to me like its an integrated part of powershell that microsoft forgot about so any time they bring out a new server they just take powershell as it is and make the changes to the code they want to make, which leads to this feature not being touched since server 2016 and thats probably why the string is hard coded, it probably wasnt meant to carry over for this long.

    • @Mario583a
      @Mario583a 14 часов назад

      It's not as if Microsoft forgot, it's just that they did not anticipate that this unknown vector of attack could be exploited.

  • @nullpwn
    @nullpwn 19 часов назад +24

    new attack vectors lets gooo

  • @kengonzo1640
    @kengonzo1640 19 часов назад +3

    New video released, new video watched. Best way to start the Monday morning thanks for the content

  • @cmarines7
    @cmarines7 19 часов назад +3

    Learned so much from you which had inspired me to learn more on cybersecurity. Thanks

  • @Maxjoker98
    @Maxjoker98 19 часов назад +4

    I have Bash CGI script that acts as a more competent web shell. I can actually stream events using the Server-sent events/EventSource mechanism.
    I Built it for my server control panel, but would also be a good web shell, as it has no dependencies other than a CGI-capable web server and Bash.

  • @KvapuJanjalia
    @KvapuJanjalia 18 часов назад +13

    Oh, no! If you are an administrator you can do anything! So, anyway...

    • @Mario583a
      @Mario583a 15 часов назад

      *cough* Linux.

    • @proxgs7703
      @proxgs7703 14 часов назад +7

      This is not a vuln but a clever attack vector where you can hide in plain sight. Your web shell now looks legit unlike other type of web shells.

    • @iamwitchergeraltofrivia9670
      @iamwitchergeraltofrivia9670 5 часов назад

      Hahhahaaahha microsoft says is normal

    • @PsychEngel
      @PsychEngel 3 часа назад

      ​@@iamwitchergeraltofrivia9670 Like SSH server on Linux? If I'm root on Linux, I can run sshd and I've setup a remoteshell with full access to the system and if I change some settings I don't even need to use a password to login, also I don't need to setup and webserver, which could be a hint, that the system is compromised.
      Sry, but Linux is way more unsecure, then windows, because you need administrator/root access on windows, so this isn't a vulnerability at all.
      On Linux, SSH server is enabled by default (or was, I'm not quite sure, but RHEL 9 definitely has it enabled by default!) and by default the integrated firewall was also disabled. I'm pretty sure, that most Linux distros never enabled the firewall by default, like Windows does it since it has a firewall integrated. Nowdays they enabled the firewall, but also open the SSH server by default, so you've exposed a root shell to the internet, without any interaction, whatsoever from the user..🎉

  • @JonathanSwiftUK
    @JonathanSwiftUK 8 часов назад +1

    A somewhat pointless feature, admins will administer Windows servers from .... another Windows server, using Invoke, or Enable-PSSession, or WMI or WinRM, no need for this odd feature. And for WinRM you can restrict which machines can connect. I'd never install this, or use it. Imagine having IIS on every Windows box - a significant increase in the attack surface.

  • @corenb
    @corenb 11 часов назад +1

    This is interesting, but if a threat actor had access to a local admin account, is Powershell not just one of many things they could access remotely?

  • @Speed0a
    @Speed0a 19 часов назад +9

    It's like Enter-PSSession. But for web?

    • @Alfred-Neuman
      @Alfred-Neuman 18 часов назад

      I just verified with Microsoft and Powershell is not even a virus, apparently it is a perfectly normal feature inside Windows.
      People are so paranoid these days...

    • @PsychEngel
      @PsychEngel 3 часа назад

      It's like ssh, but you've to be administrator on the windows machine, you've to install two separate packages, which aren't installed by default, like on Linux!!!!

  • @svettnabb
    @svettnabb 15 часов назад

    It's normal windows domain login behavior, host is always hostname not IP. You could do just .\username which automatically prefixes the computers hostname, or you could do localhost\

  • @starling-
    @starling- 16 часов назад +3

    How this "vulnerability" is different from exposing RDP port ? It's basically the same logic. Anyway, you should not do this.

  • @achepta
    @achepta 16 часов назад +1

    Hey John, do you remember the Apex Legends Hacker Destroyer2009 aka timoxa?
    It seems he discovered yet another 0-day related to anticheat recently. Could you cover this topic, please?

  • @Lelines0
    @Lelines0 15 часов назад +2

    Is it really any worse than having SSH enabled on a server that has exposure to the internet?

    • @itssardine5351
      @itssardine5351 13 часов назад

      I’m kind of lost, doesn’t every vps machine have its ssh port open to the internet tho?

    • @PsychEngel
      @PsychEngel 3 часа назад

      No, it's not half as worse, as SSH!
      1. The SSH server is enabled on nearly any Linux distribution out there.
      2. If the distribution has it's firewall enabled (not all have/had them enabled or installed), then sshd is open by default.
      3. On Windows, you've to enable explicit two packages/features with administrator access.
      4. You've to use credentials on Windows, you can't access the server without a password or any other sort auf authentication.
      5. On Linux, I've to change one setting and I don't even need a password or any other authentication, besides the username.
      If you get this points and compare them side by side, then Linux is obviously way more insecure, since you already need administrator access to the machine. As an attacker, this is nearly never the case they start, so all of the points aren't valid at all!
      If it is, then most, if not all Linux distributions are definitely insecure by itself and can't be more secure then windows, which has an built-in firewall, which is activated and configured by default and is way more restrict, then the default firewall on Linux, if it's configured at all...

  • @AkiAfroo
    @AkiAfroo 10 часов назад

    a post in reddit:
    "PowerShell Web Access: What could possibly go wrong?"
    12y ago. xD , thx microsoft.

  • @creatorofimages7925
    @creatorofimages7925 18 часов назад +1

    Is this really a recent topic? I knew that this is a potential hazard when I was working with it as a student for a company with no motivation & know-how to try and confirm my suspicions. But surely security researches would have caught up on this much earlier, no? A bit strange that only now it seems to have gained attention. Another channel, for which the US discovered that not only their agencies knew about it and used it - and thus are now making it public. Because the gain does not outweight the cost. The whole Azure Webshell for example reeked of potential abuse.

  • @catcatcatcatcatcatcatcatcatca
    @catcatcatcatcatcatcatcatcatca 16 часов назад +2

    I actually feel like this, or at least the original article/tweets is clickbait. It’s a server. You had the local admin account, reconfigured the policy, and the policy works as expected.
    As long as it is visible in the event log as a remote login, I fail to see how this is a backdoor any more than other methods.
    Does it use a different, unmonitored port? Even then, the attacker already has local admin privileges, there is nothing stopping them from setting up a RAT in any way they want. Reverse connection would be so much harder to detect as well.
    They instead (translating to linux) enabled root-login and configured either webshell or ssh to allow it from any source. They already had complete control over the host (in the demo they already had privileges on the hypervisor… ). So they just wrote a policy and used it as it was written. The host was not protected by a domain firewall given they can reach it with inbound connection.
    Like seriously. This is like calling SSH or RDP a backdoor, because they excist. Someone could use them for remote connections!

  • @bhag47
    @bhag47 18 часов назад +1

    Time to back in 🎃

  • @PandaJP77
    @PandaJP77 13 часов назад

    Free undetectable web shell 😂😂 thank you Microsoft

  • @vipshnu
    @vipshnu 18 часов назад +2

    How fast will MS fix the website to say Windows 2022 🤪

  • @RandomytchannelGD
    @RandomytchannelGD 19 часов назад

    Hi

  • @chancymzama7478
    @chancymzama7478 32 минуты назад

    wow. this is great

  • @user-kf7-b8o
    @user-kf7-b8o 19 часов назад

    I have a question sonosuite s.l is your company

  • @carsonjamesiv2512
    @carsonjamesiv2512 18 часов назад

    This is COOL!😃👍

  • @monkaSisLife
    @monkaSisLife 7 часов назад +1

    what a nothingburger video

  • @attribute-4677
    @attribute-4677 7 часов назад

    You need new thumbnail ideas.

  • @KhongBerngLearch
    @KhongBerngLearch 19 часов назад

    Idol

  • @itzbenplaiz
    @itzbenplaiz 19 часов назад

    E

  • @rene291
    @rene291 7 часов назад

    i think microsoft needs to overhaul windows server platform, because this showing as a feature of windows server 2016 is simply laziness.