githubEdit

Remote Processes Spawn

PSEXEC (SYSINTERNALS)

Ports: 445/TCP 9SMB)

Group Memberships: Administrators

How does it work?

1) Connect to Admin$ share and upload a service binary

2) Connect to the service control manager to create and run a service named psexecsvc and associate the service binary with C:\Windows\psexecsvc.exe

3) Create some named pipes to handle stdin/stdout/stderr

Example:

psexec64.exe \\MACHINE_IP -u Administrator -p PASSWORD -i cmd.exe

WINRM

Ports: 5985/TCP (WinRM HTTP), 5986/TCP (WinRM HTTPS)

Group Memberships: Remote Managenemt Users

POWERSHELL

Steps:

1)

2)

3)

4)

SC

Ports: 135/TCP, 49152-65535/TCP (DCE/RPC) 445/TCP (RPC over SMB named pipes) 139/TCP (RPC over SMB named pipes)

Group Memberships: Administrators

1)

2)

3)

4)

SCHEDULED TASKS REMOTE CREATION

1)

2)

3)

Last updated