Skip to content
This repository was archived by the owner on Dec 6, 2023. It is now read-only.

Powershell Obfuscation #134

Closed
c0d3xpl0it opened this issue Oct 9, 2016 · 4 comments
Closed

Powershell Obfuscation #134

c0d3xpl0it opened this issue Oct 9, 2016 · 4 comments

Comments

@c0d3xpl0it
Copy link

Hello,

Whenever we use the crackmapexec in corporate environment with --mimikatz option, we dont receive any output. Mostly because AV flags mimikatz and stop execution. Is it possible to obfuscation the mimikatz powershell script can be obfuscated and then sent to target ? I saw one project for powershell obfuscation (https://github.com/danielbohannon/Invoke-Obfuscation).

Do guide, if i am missing on something.

@c0d3xpl0it
Copy link
Author

c0d3xpl0it commented Feb 24, 2017

Any plans to release this feature in upcoming v4.0 ?

The blog http://www.blackhillsinfosec.com/?p=5555 has pretty good and easy obfuscation trick to bypass AV. CME helps it to spray Mimikatz on larger subnet, so I am asking for this feature.

@byt3bl33d3r
Copy link
Owner

@c0d3xpl0it yup! I'm planning on integrating PS obfuscation in v4.0 using Invoke-Obfuscation. There is currently an issue with PowerShell v2.0 compatibility with the obfuscated scripts, I'm currently working with the author to resolve this issue danielbohannon/Invoke-Obfuscation#10

@byt3bl33d3r
Copy link
Owner

Update on this, the code to support obfuscation through Invoke-Obfuscation is done (https://github.com/byt3bl33d3r/CrackMapExec/blob/master/cme/helpers/powershell.py), Im still currently waiting for that issue to be resolved.

@byt3bl33d3r
Copy link
Owner

implemented in 7149b24

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants