All Projects → pwn1sher → WMEye

pwn1sher / WMEye

Licence: MIT license
WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement

Programming Languages

C#
18002 projects

Labels

Projects that are alternatives of or similar to WMEye

Litmus test
Detecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (-39.68%)
Mutual labels:  red-team
Physmem2profit
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Stars: ✭ 244 (-22.54%)
Mutual labels:  red-team
AlanFramework
A C2 post-exploitation framework
Stars: ✭ 405 (+28.57%)
Mutual labels:  red-team
Satellite
easy-to-use payload hosting
Stars: ✭ 193 (-38.73%)
Mutual labels:  red-team
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+892.38%)
Mutual labels:  red-team
hackarsenaltoolkit
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-87.62%)
Mutual labels:  red-team
Community Threats
The GitHub of Adversary Emulation Plans in JSON. Share SCYTHE threats with the community. #ThreatThursday adversary emulation plans are shared here.
Stars: ✭ 169 (-46.35%)
Mutual labels:  red-team
readhook
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-90.16%)
Mutual labels:  red-team
Rubyfu
Rubyfu, where Ruby goes evil!
Stars: ✭ 228 (-27.62%)
Mutual labels:  red-team
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-80.95%)
Mutual labels:  red-team
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
Stars: ✭ 2,747 (+772.06%)
Mutual labels:  red-team
Dart
DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Stars: ✭ 207 (-34.29%)
Mutual labels:  red-team
JALSI
JALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-90.79%)
Mutual labels:  red-team
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-38.73%)
Mutual labels:  red-team
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-94.6%)
Mutual labels:  red-team
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+773.02%)
Mutual labels:  red-team
Red Team Infrastructure Wiki
Wiki to collect Red Team infrastructure hardening resources
Stars: ✭ 2,981 (+846.35%)
Mutual labels:  red-team
passwordstate-decryptor
PowerShell script that decrypts password entries from a Passwordstate server.
Stars: ✭ 19 (-93.97%)
Mutual labels:  red-team
DcRat
A simple remote tool in C#.
Stars: ✭ 709 (+125.08%)
Mutual labels:  red-team
InlineWhispers2
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (-50.48%)
Mutual labels:  red-team

WMEye

WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement using WMI and remote MSBuild Execution. It uploads the encoded/encrypted shellcode into remote targets WMI Class Property, create an event filter that when triggered writes an MSBuild based Payload using a special WMI Class called LogFileEventConsumer and finally executes the payload remotely.

UseCase

Fileless Lateral Movement using WMI, can be used with Cobalt Strike's Execute-Assembly

Note: This is still in experimental stage and no where near to be used in a real engagement.

Preview

Alt Text

Current Working

  • Creates a Remote WMI Class
  • Writes Shellcode as property value to the above created Fake WMI Class
  • Creates a WMI Event Filter to trigger on powershell.exe process creation
  • On Event Trigger, it Uploads MSBuild Payload into remote system using LogFileEventConsumer (A WMI Consumer type to write Log Files)
  • Finally Invoke Win32_Process Create to call MSbuild remotely

The MSBuild Payload fetches encoded shellcode from WMI Class Property, decodes and executes it.

Upcoming Features

  • Replace WIN32_Process Create method of invocation with something better
  • Add GZIP Compression for Shellcode and XML File Bytes
  • Add NTLM PTH Support
  • Add CleanUp Functions for removing event filter after the logfileeventconsumer finished writing the MSBuild Payload

Whats Unique in this Project ?

  • Uploads the encoded/encrypted shellcode to remote machines WMI property on a Created Fake Class (can maybe tweak to write shellcode into existing class's Property)
  • Uses LogFileEventConsumer to upload MSBuild File , instead of relying in spawning Powershell.exe using win32_process Create

Credits

https://www.fireeye.de/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].