Create wmi-cmd-evasion-process.json

patch-1
Mr.Un1k0d3r 2017-08-03 14:41:07 -04:00 committed by GitHub
parent 7b04db48fa
commit 6c7c3c965b
1 changed files with 13 additions and 0 deletions

View File

@ -0,0 +1,13 @@
{
"description": "Command exec payload using WMI Win32_Process class\nEvasion technique set to check running process",
"template": "templates/payloads/wmi-evasion-process-template.vba",
"varcount": 150,
"encodingoffset": 4,
"chunksize": 200,
"encodedvars": {
"PROCESS_NAME":"outlook.exe"
},
"vars": [],
"evasion": ["encoder", "process"],
"payload": "cmd.exe /c whoami"
}