Home News Researcher Developed A WMI-Based Hacking Tool in PowerShell

Researcher Developed A WMI-Based Hacking Tool in PowerShell

by Unallocated Author

A Security researcher named Christopher Truncer has released a WMI-based agentless post-exploitation RAT which he made in PowerShell.

Last year, Christopher  Truncer has released a PowerShell script which is capable of carrying out different actions using the Windows Management Instrumentation (WMI), both on local and on the remote machines. Named as WMImplant, this newly released Remote Access Tool (RAT) builds on that script, says Christopher Truncer, who is a security researcher and Red Teamer at the Mandiant.

“The WMImplant leverages WMI for the command and control channel, the means for executing actions (gathering data, issuing commands, etc.) on the targeted system, and data storage. It is designed to run both interactively and non-interactively. When using WMImplant interactively, it’s designed to have a menu of commands reminiscent of Meterpreter,” Truncer reveals.

Some of the commands supported by the new tool include reading file contents and downloading files from the remote machine, listing the files and folders for a specific directory, searching for a file on a user-specified drive, and upload a file to the remote machine. It can also be used to list processes and start or kill a specific process.

Additionally, the tool can be used for lateral movement, offering support for running command line commands and getting the output, adding, modifying or removing registry values, enabling or disabling WinRM on the targeted host, running a PowerShell script on a system and receiving output, manipulating scheduled jobs, and creating, modifying, or deleting services.

WMImplant also offers support for data gathering operations (including information on users, targeted system, local and network drives, IP addresses, and installed programs), for logging off users, and for shutting down or restarting targeted systems. It can also be used to determine whether a user is away from the machine and to identify users who have logged into the system.


You may also like