π [ OscarAkaElvis, Γscar Alfonso DΓaz ]
New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance π
https://t.co/PEwvSTxt8p
Thanks @CyberVaca_ @_Laox @arale61
#evilwinrm #winrm #hacking #pentesting
π https://github.com/Hackplayers/evil-winrm
π₯ [ tweet ]
New Evil-WinRM release (v3.4). Released for the @uad360 cyber security event. C'mon @msftsecurity how about a new Defender signature? Let's dance π
https://t.co/PEwvSTxt8p
Thanks @CyberVaca_ @_Laox @arale61
#evilwinrm #winrm #hacking #pentesting
π https://github.com/Hackplayers/evil-winrm
π₯ [ tweet ]
π2
Forwarded from APT
π Exploring WinRM plugins for lateral movement
In this blog, the process of leveraging WinRM plugins to perform lateral movement to other systems is explored. Additionally, the use of the
π Research:
https://falconforce.nl/exploring-winrm-plugins-for-lateral-movement/
π Source:
https://github.com/FalconForceTeam/bof-winrm-plugin-jump
#ad #winrm #cobaltstrike #bof #redteam
In this blog, the process of leveraging WinRM plugins to perform lateral movement to other systems is explored. Additionally, the use of the
CIM_LogicFile
WMI class to bypass certain tricky detections by Microsoft Defender is examined. Finally, all the logic is incorporated into a Cobalt Strike BOF.π Research:
https://falconforce.nl/exploring-winrm-plugins-for-lateral-movement/
π Source:
https://github.com/FalconForceTeam/bof-winrm-plugin-jump
#ad #winrm #cobaltstrike #bof #redteam
FalconForce
Exploring WinRM plugins for lateral movement - FalconForce
We explore how to leverage WinRM plugins to perform lateral movement to other systems and put all the logic in a Cobalt Strike BOF.
π7π₯2