Invoke-SSHCommand - Empire Module


This page contains detailed information about how to use the powershell/lateral_movement/invoke_sshcommand Empire module. For list of all Empire modules, visit the Empire Module Library.

Module Overview


Name: Invoke-SSHCommand
Module: powershell/lateral_movement/invoke_sshcommand
Source code [1]: empire/server/modules/powershell/lateral_movement/invoke_sshcommand.yaml
Source code [2]: empire/server/modules/powershell/lateral_movement/invoke_sshcommand.py
MITRE ATT&CK: T1071
Language: PowerShell
Needs admin: No
OPSEC safe: Yes
Background: Yes

The invoke_sshcommand module executes a command on a remote host via SSH.

This module runs in a foreground and is OPSEC unsafe as it writes on the disk and therefore could be detected by AV/EDR running on the target system.

Note that the invoke_sshcommand module does not need administrative privileges to work properly which means that a normal user can run this module.

Required Module Options


This is a list of options that are required by the invoke_sshcommand module:

Agent
Agent to run module on.

Command
The command to run on the remote host.

IP
Address of the target server.

Additional Module Options


This is a list of additional options that are supported by the invoke_sshcommand module:

CredID
CredID from the store to use.

Password
The password to login with.

Username
The username to login with.

Invoke_sshcommand Example Usage


Here's an example of how to use the invoke_sshcommand module in the Empire client console:

[+] New agent Y4LHEV83 checked in
[*] Sending agent (stage 2) to Y4LHEV83 at 192.168.204.135
(empire usestager/windows/ducky) > usemodule powershell/lateral_movement/invoke_sshcommand

 Author       @424f424f                                     
 Background   True                                          
 Comments     Open Source is the Best Source                
 Description  Executes a command on a remote host via SSH.  
 Language     powershell                                    
 Name         powershell/lateral_movement/invoke_sshcommand 
 NeedsAdmin   False                                         
 OpsecSafe    True                                          
 Techniques   http://attack.mitre.org/techniques/T1071      


,Record Options----,----------,----------------------------------,
| Name     | Value | Required | Description                      |
|----------|-------|----------|----------------------------------|
| Agent    |       | True     | Agent to run module on.          |
|----------|-------|----------|----------------------------------|
| Command  |       | True     | The command to run on the remote |
|          |       |          | host.                            |
|----------|-------|----------|----------------------------------|
| CredID   |       | False    | CredID from the store to use.    |
|----------|-------|----------|----------------------------------|
| IP       |       | True     | Address of the target server.    |
|----------|-------|----------|----------------------------------|
| Password |       | False    | The password to login with.      |
|----------|-------|----------|----------------------------------|
| Username |       | False    | The username to login with.      |
'----------'-------'----------'----------------------------------'

(Empire: usemodule/powershell/lateral_movement/invoke_sshcommand) > set Agent Y4LHEV83
[*] Set Agent to Y4LHEV83
(Empire: usemodule/powershell/lateral_movement/invoke_sshcommand) > set Command SomeCommand
[*] Set Command to SomeCommand
(Empire: usemodule/powershell/lateral_movement/invoke_sshcommand) > set IP value
[*] Set IP to value
(Empire: usemodule/powershell/lateral_movement/invoke_sshcommand) > execute
[*] Tasked Y4LHEV83 to run Task 1
...

Now wait for the results to come.

Author


References


See Also


Check also the following modules related to this module:

Version


This page has been created based on Empire version 4.1.3 (BC Security Fork).
Visit Empire Module Library for more modules.