module

Forward SSH Agent Requests To Remote Pageant

Disclosed
N/A
Created
May 30, 2018

Description

This module forwards SSH agent requests from a local socket to a remote Pageant instance.
If a target Windows machine is compromised and is running Pageant, this will allow the
attacker to run normal OpenSSH commands (e.g. ssh-add -l) against the Pageant host which are
tunneled through the meterpreter session. This could therefore be used to authenticate
with a remote host using a private key which is loaded into a remote user's Pageant instance,
without ever having knowledge of the private key itself.

Note that this requires the PageantJacker meterpreter extension, but this will be automatically
loaded into the remote meterpreter session by this module if it is not already loaded.

Authors

Stuart Morgan stuart.morgan@mwrinfosecurity.com
Ben Campbell eat_meatballs@hotmail.co.uk

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use post/windows/manage/forward_pageant
msf post(forward_pageant) > show actions
...actions...
msf post(forward_pageant) > set ACTION < action-name >
msf post(forward_pageant) > show options
...show and set options...
msf post(forward_pageant) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.