2018-06-09 00:15:06 +02:00
|
|
|
---
|
|
|
|
Name: Rpcping.exe
|
2018-09-24 21:59:43 +02:00
|
|
|
Description: Used to verify rpc connection
|
|
|
|
Author: 'Oddvar Moe'
|
2021-01-10 16:04:52 +01:00
|
|
|
Created: 2018-05-25
|
2018-06-09 00:15:06 +02:00
|
|
|
Commands:
|
|
|
|
- Command: rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM
|
|
|
|
Description: Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.
|
2018-09-24 21:59:43 +02:00
|
|
|
Usecase: Capture credentials on a non-standard port
|
|
|
|
Category: Credentials
|
|
|
|
Privileges: User
|
|
|
|
MitreID: T1003
|
|
|
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
|
|
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
2018-12-10 14:28:12 +01:00
|
|
|
Full_Path:
|
2018-09-24 21:59:43 +02:00
|
|
|
- Path: C:\Windows\System32\rpcping.exe
|
|
|
|
- Path: C:\Windows\SysWOW64\rpcping.exe
|
2021-01-10 16:04:52 +01:00
|
|
|
Code_Sample:
|
2018-09-24 21:59:43 +02:00
|
|
|
- Code:
|
|
|
|
Detection:
|
|
|
|
- IOC:
|
2018-06-09 00:15:06 +02:00
|
|
|
Resources:
|
2018-09-24 21:59:43 +02:00
|
|
|
- Link: https://github.com/vysec/RedTips
|
|
|
|
- Link: https://twitter.com/vysecurity/status/974806438316072960
|
|
|
|
- Link: https://twitter.com/vysecurity/status/873181705024266241
|
|
|
|
Acknowledgement:
|
|
|
|
- Person: Casey Smith
|
|
|
|
Handle: '@subtee'
|
|
|
|
- Person: Vincent Yiu
|
|
|
|
Handle: '@vysecurity'
|
2021-01-10 16:04:52 +01:00
|
|
|
---
|