• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2017
  • November
  • 29
  • Nishang – PowerShell Penetration Testing Framework

Nishang – PowerShell Penetration Testing Framework

November 29, 2017 Comments Off on Nishang – PowerShell Penetration Testing Framework
how to use nishang nishang Nishang - PowerShell Penetration Testing Framework nishang powershell nishang tutorial pentesting with powershell powershell backdoor powershell pentesting tools

Nishang is an open source framework and collection of powerful PowerShell scripts and payloads that you can use during penetration testing audit, post exploitation phase or other stages of offensive security auditing.

Nishang is useful during various phases of a security auditing process and has many scripts categorized into logical categories such as information gathering, scanning, privilege elevation etc.

PowerShell Penetration Testing Framework Usage:

Import all scripts in the current PowerShell session (PowerShell v3 onwards).

C:\nishang> Import-Module .\nishang.psm1

Use the individual scripts with dot sourcing.

C:\nishang> . C:\nishang\Gather\Get-Information.ps1
C:\nishang> Get-Information

To get help about any script or function, use:

C:\nishang> Get-Help [scriptname] -full

Note: Help is available for the function loaded after running a script but not the script itself – since version 0.3.8. The function names are the same as script names.

For example, to see the help about Get-WLAN-Keys.ps1, use

C:\nishang> . C:\nishang\Get-WLAN-Keys.ps1
C:\nishang> Get-Help Get-WLAN-Keys -Full

 

Scripts

Nishang currently contains the following scripts and payloads.


ActiveDirectory

  • Get-Unconstrained – Find computers in active directory which have Kerberos Unconstrained Delegation enabled.

 

Antak – the Webshell

  • Antak – Execute PowerShell scripts in memory, run commands, and download and upload files using this webshell.

 

Backdoors

  • HTTP-Backdoor – A backdoor which can receive instructions from third party websites and execute PowerShell scripts in memory.
  • DNS_TXT_Pwnage – A backdoor which can receive commands and PowerShell scripts from DNS TXT queries, execute them on a target, and be remotely controlled using the queries.
  • Execute-OnTime – A backdoor which can execute PowerShell scripts at a given time on a target.
  • Gupt-Backdoor – A backdoor which can receive commands and scripts from a WLAN SSID without connecting to it.
  • Add-ScrnSaveBackdoor – A backdoor which can use Windows screen saver for remote command and script execution.
  • Invoke-ADSBackdoor – A backdoor which can use alternate data streams and Windows Registry to achieve persistence.
  • Add-RegBackdoor – A backdoor which uses well known Debugger trick to execute payload with Sticky keys and Utilman (Windows key + U).
  • Set-RemoteWMI – Modify permissions of DCOM and WMI namespaces to allow access to a non-admin user.
  • Set-RemotePSRemoting – Modify permissions of PowerShell remoting to allow access to a non-admin user.

 

Bypass

  • Invoke-AmsiBypass – Implementation of publicly known methods to bypass/avoid AMSI.

 

Client

  • Out-CHM – Create infected CHM files which can execute PowerShell commands and scripts.
  • Out-Word – Create Word files and infect existing ones to run PowerShell commands and scripts.
  • Out-Excel – Create Excel files and infect existing ones to run PowerShell commands and scripts.
  • Out-HTA – Create a HTA file which can be deployed on a web server and used in phishing campaigns.
  • Out-Java – Create signed JAR files which can be used with applets for script and command execution.
  • Out-Shortcut – Create shortcut files capable of executing PowerShell commands and scripts.
  • Out-WebQuery – Create IQY files for phishing credentials and SMB hashes.
  • Out-JS – Create JS files capable of executing PowerShell commands and scripts.
  • Out-SCT – Create SCT files capable of executing PowerShell commands and scripts.
  • Out-SCF – Create a SCF file which can be used for capturing NTLM hash challenges.

 

Escalation

  • Enable-DuplicateToken – When SYSTEM privileges are required.
  • Remove-Update – Introduce vulnerabilities by removing patches.
  • Invoke-PsUACme – Bypass UAC.

 

Execution

  • Download-Execute-PS – Download and execute a PowerShell script in memory.
  • Download_Execute – Download an executable in text format, convert it to an executable, and execute.
  • Execute-Command-MSSQL – Run PowerShell commands, native commands, or SQL commands on a MSSQL Server with sufficient privileges.
  • Execute-DNSTXT-Code – Execute shellcode in memory using DNS TXT queries.
  • Out-RundllCommand – Execute PowerShell commands and scripts or a reverse PowerShell session using rundll32.exe.

 

Gather

  • Check-VM – Check for a virtual machine.
  • Copy-VSS – Copy the SAM file using Volume Shadow Copy Service.
  • Invoke-CredentialsPhish – Trick a user into giving credentials in plain text.
  • FireBuster FireListener – A pair of scripts for egress testing
  • Get-Information – Get juicy information from a target.
  • Get-LSASecret – Get LSA Secret from a target.
  • Get-PassHashes – Get password hashes from a target.
  • Get-WLAN-Keys – Get WLAN keys in plain text from a target.
  • Keylogger – Log keystrokes from a target.
  • Invoke-MimikatzWdigestDowngrade – Dump user passwords in plain on Windows 8.1 and Server 2012
  • Get-PassHints – Get password hints of Windows users from a target.
  • Show-TargetScreen – Connect back and Stream target screen using MJPEG.
  • Invoke-Mimikatz – Load mimikatz in memory. Updated and with some customisation.
  • Invoke-Mimikittenz – Extract juicy information from target process (like browsers) memory using regex.
  • Invoke-SSIDExfil – Exfiltrate information like user credentials, using WLAN SSID.
  • Invoke-SessionGopher – Identify admin jump-boxes and/or computers used to access Unix machines.

 

MITM

  • Invoke-Interceptor – A local HTTPS proxy for MITM attacks.

 

Pivot

  • Create-MultipleSessions – Check credentials on multiple computers and create PSSessions.
  • Run-EXEonRemote  – Copy and execute an executable on multiple machines.
  • Invoke-NetworkRelay  – Create network relays between computers.

 

Prasadhak

  • Prasadhak – Check running hashes of running process against the VirusTotal database.

 

Scan

  • Brute-Force – Brute force FTP, Active Directory, MSSQL, and Sharepoint.
  • Port-Scan – A handy port scanner.

 

Powerpreter

  • Powerpreter – All the functionality of nishang in a single script module.

 

Shells

  • Invoke-PsGcat – Send commands and scripts to specifed Gmail account to be executed by Invoke-PsGcatAgent
  • Invoke-PsGcatAgent – Execute commands and scripts sent by Invoke-PsGcat.
  • Invoke-PowerShellTcp – An interactive PowerShell reverse connect or bind shell
  • Invoke-PowerShellTcpOneLine – Stripped down version of Invoke-PowerShellTcp. Also contains, a skeleton version which could fit in two tweets.
  • Invoke-PowerShellTcpOneLineBind – Bind version of Invoke-PowerShellTcpOneLine.
  • Invoke-PowerShellUdp – An interactive PowerShell reverse connect or bind shell over UDP
  • Invoke-PowerShellUdpOneLine – Stripped down version of Invoke-PowerShellUdp.
  • Invoke-PoshRatHttps – Reverse interactive PowerShell over HTTPS.
  • Invoke-PoshRatHttp – Reverse interactive PowerShell over HTTP.
  • Remove-PoshRat – Clean the system after using Invoke-PoshRatHttps
  • Invoke-PowerShellWmi – Interactive PowerShell using WMI.
  • Invoke-PowerShellIcmp – An interactive PowerShell reverse shell over ICMP.
  • Invoke-JSRatRundll – An interactive PowerShell reverse shell over HTTP using rundll32.exe.
  • Invoke-JSRatRegsvr – An interactive PowerShell reverse shell over HTTP using regsvr32.exe.

 

Utility

  • Add-Exfiltration – Add data exfiltration capability to Gmail, Pastebin, a web server, and DNS to any script.
  • Add-Persistence – Add reboot persistence capability to a script.
  • Remove-Persistence – Remote persistence added by the Add-Persistence script.
  • Do-Exfiltration – Pipe (|) this to any script to exfiltrate the output.
  • Download – Transfer a file to the target.
  • Parse_Keys – Parse keys logged by the keylogger.
  • Invoke-Encode – Encode and compress a script or string.
  • Invoke-Decode – Decode and decompress a script or string from Invoke-Encode.
  • Start-CaptureServer – Run a web server which logs Basic authentication and SMB hashes.
  • ConvertTo-ROT13 – Encode a string to ROT13 or decode a ROT13 string.
  • Out-DnsTxt – Generate DNS TXT records which could be used with other scripts.
  • [Base64ToString]
  • [StringToBase64]
  • [ExetoText]
  • [TexttoExe]

 

PowerShell Penetration Testing Framework: Nishang download

Post navigation

Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack
Quiet – Transmit Data Through Sound

Related Articles

Geogramint: OSINT Geolocalization tool for Telegram

Geogramint: OSINT Geolocalization tool for Telegram

- Hack Tools
March 28, 2023
Polaris: open source policy engine for Kubernetes

Polaris: open source policy engine for Kubernetes

- Hack Tools
March 27, 2023
ThunderCloud - Cloud Exploit Framework

ThunderCloud – Cloud Exploit Framework

- Hack Tools
March 27, 2023
hacker gadgets
hacker phone covers

Recent Posts

Geogramint: OSINT Geolocalization tool for Telegram

Geogramint: OSINT Geolocalization tool for Telegram

March 28, 2023
Polaris: open source policy engine for Kubernetes

Polaris: open source policy engine for Kubernetes

March 27, 2023
ThunderCloud - Cloud Exploit Framework

ThunderCloud – Cloud Exploit Framework

March 27, 2023
CVE-2023-1177: RFI Vulnerability in Machine Learning Lifecycle Platform, MLflow

CVE-2023-1177: RFI Vulnerability in Machine Learning Lifecycle Platform, MLflow

March 27, 2023
Waf-Bypass - Check Your WAF Before An Attacker Does

Waf-Bypass – Check Your WAF Before An Attacker Does

March 26, 2023
QRExfiltrate - Tool That Allows You To Convert Any Binary File Into A QRcode Movie. The Data Can Then Be Reassembled Visually Allowing Exfiltration Of Data In Air Gapped Systems

QRExfiltrate – Tool That Allows You To Convert Any Binary File Into A QRcode Movie. The Data Can Then Be Reassembled Visually Allowing Exfiltration Of Data In Air Gapped Systems

March 25, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW