All Projects → Orange-Cyberdefense → wmi-shell

Orange-Cyberdefense / wmi-shell

Licence: GPL-3.0 License
WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.

Programming Languages

c
50402 projects - #5 most used programming language
python
139335 projects - #7 most used programming language
Visual Basic .NET
514 projects

wmi-shell

Proof-of-concept of an interactive shell on a target Windows machine using only the WMI system (no network shares are needed to extract command output).

Remote WMI access must be configured on the target. No SMB services are needed. All command output is obtained exclusively using the WMI access, through storage in the WMI repository.

Usage

Launch the script on Kali Linux 32-bit with either the cleartext password or the password hash of an administrator account on the target Windows machine:

python -O wmi-shell.py <USERNAME> <PASSWORD> <TARGET_IP>
python -O wmi-shell.py <USERNAME> <LM:NTLM> <TARGET_IP>	

Usual Windows commands can be launched from the interactive shell the script provides:

>>> dir c:

A post-exploitation tool like mimikatz can also be uploaded and ran to extract passwords from the target:

>>> upload ../mimikatz.exe
>>> %TEMP%\mimikatz.exe privilege::debug sekurlsa::logonPasswords exit

Requirements

Kali Linux 32-bit with Pass the Hash toolkit (installed by default).

The necessary pth-wmis tool does not work on Kali Linux 64-bit, so it's only 32-bit systems for now.

To make the script run from other systems, you must download and install the PTH toolkit and some old libraries needed by the wmis and wmic tools.

Example for a 32-bit Debian:

git clone https://github.com/byt3bl33d3r/pth-toolkit
sudo apt install multiarch-support
wget http://ftp.de.debian.org/debian/pool/main/libt/libtasn1-3/libtasn1-3_2.13-2+deb7u2_i386.deb
wget http://ftp.de.debian.org/debian/pool/main/g/gnutls26/libgnutls26_2.12.20-8+deb7u5_i386.deb
wget http://ftp.de.debian.org/debian/pool/main/libg/libgcrypt11/libgcrypt11_1.5.0-5+deb7u4_i386.deb
dpkg -i libgcrypt11_1.5.0-5+deb7u4_i386.deb
dpkg -i libtasn1-3_2.13-2+deb7u2_i386.deb
dpkg -i libgnutls26_2.12.20-8+deb7u5_i386.deb

Project details

This project was initially presented at the 2014 Hackito Ergo Sum conference by Andrei Dumitrescu. The presentation slides can be found online:

Description:

The Windows Management Instrumentation (WMI) technology is included by default in all versions of Windows since Windows Millenium. The WMI technology is used by Windows administrators to get a variety of information concerning the target machine (like user account information, the list of running processes etc.) and to create/kill processes on the machine.

From a pentester’s point of view, WMI is just another method of executing commands remotely on target machines in a post-exploitation scenario. This can be achieved by creating processes on the remote machine using a WMI client. However, at the present time the output of the executed command cannot be easily recovered ; a potential solution would be write the output to a file and get these files using the SMB server on port 445, but this requires having remote file access on the target machine, which might not always be the case.

We have developed a tool that allows us to execute commands and get their output using only the WMI infrastructure, without any help from other services, like the SMB server. With the wmi-shell tool we can execute commands, upload files and recover Windows passwords remotely using just the WMI service that listens on port 135. During this talk we will quickly review current authenticated remote code execution methods available for Windows, we will explain the aspects of the WMI architecture that make the wmi-shell possible and we will present the tool itself (demo & links to the source code).

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].