commands_that_can_be_executed_in_file_based_malware_simulations
no way to compare when less than two revisions
Differences
This shows you the differences between two versions of the page.
Next revision | |||
— | commands_that_can_be_executed_in_file_based_malware_simulations [2016/06/28 08:26] – created lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ===== Which tools can be used for command shell execution? ===== | ||
+ | |||
+ | LUCY comes with three tools that will access the windows command shell and enable you to execute commands: | ||
+ | |||
+ | * **ConsolePost**: | ||
+ | |||
+ | * **ConsoleOutlook**: | ||
+ | |||
+ | * **ConsoleInteractive**: | ||
+ | |||
+ | * **Macro Simulation “POST ONLY**: this tool is described [[create_a_phishing_campaign_with_a_word_macro|here]]. | ||
+ | |||
+ | |||
+ | ===== What are the limitations? | ||
+ | |||
+ | In the community edition you might be only able to execute the following commands: | ||
+ | |||
+ | * whoami | ||
+ | * date | ||
+ | * time | ||
+ | * date /T | ||
+ | * time /T | ||
+ | * ipconfig | ||
+ | |||
+ | |||
+ | In the commercial edition there are no limitations. Commercial editions allow any command to be executed using this syntax: | ||
+ | |||
+ | cmd.exe /c "YOUR COMMAND GOES HERE" (some commands in Windows are not executable. They are built into the command line. Example of command with executable: whoami. If you need to use a command which is a built in command line, then you should call cmd directly. Example for requesting the directory content: “cmd /c dir”). | ||
+ | |||
+ | So, for example, standard cmd.exe commands are accessible like: | ||
+ | * dir (list directory contents) | ||
+ | * md (create directory) | ||
+ | * etc | ||
+ | |||
+ | |||
+ | |||
+ | |||
commands_that_can_be_executed_in_file_based_malware_simulations.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1