Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add smbexec to repos #13

Open
brav0hax opened this issue Jun 11, 2012 · 1 comment
Open

Add smbexec to repos #13

brav0hax opened this issue Jun 11, 2012 · 1 comment

Comments

@brav0hax
Copy link

First let me say thank you so much for adding easy-creds to your repos. It is an absolute honor. It also means more work for me because now I need to make sure it executes in screen instead of the xterm windows.

I would like to ask that smbexec, a new script purehate and I have been working on the last week be added to the repos. We want you to be the first repo to have the tool.

Background:
The msf psexec module seems to be getting caught more and more, so we wrote this to emulate that "attack" using the smb tools smbclient & winexe.

Execution:
Creats obfuscated payload & metasploit rc file based on payload chosen, starts msf multihandler, auths to the victim with password or hash value, uploads payload to victim, executes the payload, then performs an automated cleanup of the system (kills process/deletes file).

Video:
Here is a link to a video we posted last week while we were working on the POC. It doesn't really do it justice anymore.
http://www.youtube.com/watch?v=o3d0wfGUCWM

smbexec download:
We are not sharing this with anyone at this time except a small group of friends and you guys.
https://www.box.com/s/1fef4963628f656eecb5

Please let us know what you think. [email protected]

@brav0hax
Copy link
Author

smbexec v1.0.8 has been officially release to the community on sourceforge.

https://sourceforge.net/projects/smbexec/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant