Skip to content

onecloudemoji/C.A.P.S.U.L.E.S.

Repository files navigation

C.A.P.S.U.L.E.S.

Crafting Alternative Powershell Scenarios Utilising Learning Environment Scripts.

capsules

Extensible modules designed to make a red team and pentesting lab that is more flexible, has depth and automation. Stand alone kits designed to work together or alone, as part of a larger build or a self contained deployment. These kits are not designed to automatically build infrastructure for you, I have already build that project. These will not deploy flags, and the point isnt always root.

All scripts come with twelve months of WOMM™ (works on my machine) warranty.

ACL Abuse

A two script kit to build a domain controller, then add the necessary groups, users and permissions to practice some ACL abuse and edges you might miss in BloodHound. Drop in as user 1 for an assumed breach or combine with the 'UNCLE' kit to use responder and collect hashes from outside.

UNCLE

A short script that will add a scheulded task to force a specified user to check for a non existant UNC share at a periodic interval. Presently leverages users from the ACL Abuse kit, change these as required.

Suspicious Mail Tampering Platform

Host an SMTP server that will save all attachments received to a specified folder, which will be checked every two minutes and will execute all files with the listed keywords in them. A small scale phishing simulation. Use send.py to avoid having to craft SMTP messages yourself. Amend whitelist_rules.ps1 to add more granularity to what it marks as safe or not, and give it a 30% chance of marking uploads as safe if rules are met.

GROPER

GROup Policy Exploit Research. Add an extremley vulnerable GPO to the domain that can be modified by all users. The trick here is not in modifying the GPO, it is in finding the vulnerable GPO. Relying on copypasta PowerView arguments is not suffecient to hunt this down.

Guarded Machines Still Accessible

gMSA misconfigurations. They are a great technology that can be undone by poor practices surrounding the gMSA. Trivial, insecure web app designed to showcase how well meaning and good intentions can be a burden. Two part kit, one for setting up the gMSA on the DC (needs to be run from the DC) and a second to be run on the IIS server.

OSEP LAB

Overly Simplified Experienced Pentester Laboratory. A series of scripts to deploy a lab derived from training material I have not viewed. Follow them from start to end, running them on the machine indicated in the script name. Requires 3x Server VMs.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published