Windows Management Instrumentation (WMI) Remote Command Execution Exploit

This Metasploit module executes powershell on the remote host using the current user credentials or those supplied. Instead of using PSEXEC over TCP port 445 we use the WMIC command to start a Remote Procedure Call on TCP port 135 and an ephemeral port. Set ReverseListenerComm to tunnel traffic through that session. The result is similar to psexec but with the added benefit of using the session’s current authentication token instead of having to know a password or hash. We do not get feedback from the WMIC command so there are no indicators of success or failure. The remote host must be configured to allow remote Windows Management Instrumentation.

 

You can download this exploit from the following link: https://packetstormsecurity.com/files/download/123729/wmi.rb.txt

Source: https://packetstormsecurity.com/files/123729/Windows-Management-Instrumentation-WMI-Remote-Command-Execution.html

Previous Post

resetter21.c Exploit

Next Post

PayPal Shipping Cross Site Scripting Exploit

Related Posts