Write your own metasploit psexec service
Tags
attack-pattern: | Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | 57764ad7-afc9-4a2a-9405-a7c987ddebfc |
Fingerprint | 4aa8319a34a40c6 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 27, 2017, 6:31 p.m. |
Added to db | Jan. 18, 2023, 9:45 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | danielsauder |
Title | Write your own metasploit psexec service |
Detected Hints/Tags/Attributes | 16/1/15 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4128 | github.com |
|
Details | Domain | 2 | govolution.wordpress.com |
|
Details | Domain | 10 | community.rapid7.com |
|
Details | Domain | 1 | rmn-explores.blogspot.de |
|
Details | File | 4 | status.txt |
|
Details | File | 50 | a.exe |
|
Details | File | 1 | mzrciovg.exe |
|
Details | File | 1 | windows-service-using-c.html |
|
Details | Github username | 3 | govolution |
|
Details | IPv4 | 1 | 192.168.116.183 |
|
Details | IPv4 | 1 | 192.168.116.142 |
|
Details | Url | 1 | https://github.com/govolution/avepoc/blob/master/psexecservice.c |
|
Details | Url | 1 | https://govolution.wordpress.com/2017/02/04/using-tdm-gcc-with-kali-2 |
|
Details | Url | 1 | https://community.rapid7.com/community/metasploit/blog/2013/03/09/psexec-demystified |
|
Details | Url | 1 | http://rmn-explores.blogspot.de/2010/09/windows-service-using-c.html |