WmicExec
最后更新于
这有帮助吗?
最后更新于
这有帮助吗?
Wmi allows to open process in hosts where you know username/(password/Hash). Then, Wmiexec uses wmi to execute each command that is asked to execute (this is why Wmicexec gives you semi-interactive shell).
dcomexec.py: This script gives a semi-interactive shell similar to wmiexec.py, but using different DCOM endpoints (ShellBrowserWindow DCOM object). Currently, it supports MMC20. Application, Shell Windows and Shell Browser Window objects. (from )
From an attacker's perspective, WMI can be very valuable in enumerating sensitive information about a system or the domain.
For example, here's a very stealthy way to discover local admins on a remote machine (note that domain is the computer name):
Another useful oneliner is to see who is logged on to a machine (for when you're hunting admins):
wmic
can even read nodes from a text file and execute the command on all of them. If you have a text file of workstations:
We'll remotely create a process over WMI to execute a Empire agent:
We see it executed successfully (ReturnValue = 0). And a second later our Empire listener catches it. Note the process ID is the same as WMI returned.
All this information was extracted from here: