{"id":24080,"date":"2022-04-21T11:47:27","date_gmt":"2022-04-21T11:47:27","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=24080"},"modified":"2022-04-21T11:47:29","modified_gmt":"2022-04-21T11:47:29","slug":"wmeye","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/wmeye\/","title":{"rendered":"WMEye : A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement"},"content":{"rendered":"\n<p><strong>WMEye<\/strong> is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement using WMI and remote MSBuild Execution. It uploads the encoded\/encrypted shellcode into remote targets WMI Class Property, create an event filter that when triggered writes an MSBuild based Payload using a special WMI Class called Log File Event Consumer and finally executes the payload remotely.<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/WMEye#usecase\"><\/a>UseCase<\/h1>\n\n\n\n<p>Fileless Lateral Movement using WMI, can be used with Cobalt Strike&#8217;s Execute-Assembly<\/p>\n\n\n\n<p><strong>Note<\/strong>: This is still in experimental stage and no where near to be used in a real engagement.<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/WMEye#preview\"><\/a>Preview<\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh4-nD3EWIYNLEE3Ntk6Q-GvUsF5wmtqqeRcqVREPHUlJXYpnrtc4eM7TBQs1A1NBlNIulE1ocsTTVgXOOK0MI0l4jEfZLt2dv3Ro7FcQUT3D7c2QaK0MWIgxjMRub1_QUAUcjKv-S9NFBd1WUnHjfkBW7eJjLIiqM4FXpLsq1ZuJcg93LQSrc1xKg\/s1917\/wmeye.gif\" alt=\"\" \/><\/figure>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Current Working<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li>Creates a Remote WMI Class<\/li><li>Writes Shellcode as property value to the above created Fake WMI Class<\/li><li>Creates a WMI Event Filter to trigger on powershell.exe process creation<\/li><li>On Event Trigger, it Uploads MSBuild Payload into remote system using LogFileEventConsumer (A WMI Consumer type to write Log Files)<\/li><li>Finally Invoke&nbsp;<code><strong>Win32_Process Create<\/strong><\/code>&nbsp;to call MSbuild remotely<\/li><\/ul>\n\n\n\n<p>The MSBuild Payload fetches encoded shellcode from WMI Class Property, decodes and executes it.<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/WMEye#upcoming-features\"><\/a>Upcoming Features<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li>Replace WIN32_Process Create method of invocation with something better<\/li><li>Add GZIP Compression for Shellcode and XML File Bytes<\/li><li>Add NTLM PTH Support<\/li><li>Add CleanUp Functions for removing event filter after the logfileeventconsumer finished writing the MSBuild Payload<\/li><\/ul>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/WMEye#whats-unique-in-this-project-\"><\/a>Whats Unique in this Project ?<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li>Uploads the encoded\/encrypted shellcode to remote machines WMI property on a Created Fake Class (can maybe tweak to write shellcode into existing class&#8217;s Property)<\/li><li>Uses LogFileEventConsumer to upload MSBuild File , instead of relying in spawning Powershell.exe using win32_process Create<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/pwn1sher\/WMEye\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement using WMI and remote MSBuild Execution. It uploads the encoded\/encrypted shellcode into remote targets WMI Class Property, create an event filter that when triggered writes an MSBuild based Payload using a special WMI Class [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":24085,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-24080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WMEye : A Post Exploitation Tool That Uses WMI Event Filter<\/title>\n<meta name=\"description\" content=\"WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/wmeye\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WMEye : A Post Exploitation Tool That Uses WMI Event Filter\" \/>\n<meta property=\"og:description\" content=\"WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/wmeye\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-21T11:47:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-21T11:47:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"WMEye : A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement\",\"datePublished\":\"2022-04-21T11:47:27+00:00\",\"dateModified\":\"2022-04-21T11:47:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/\"},\"wordCount\":278,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png\",\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/wmeye\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/\",\"name\":\"WMEye : A Post Exploitation Tool That Uses WMI Event Filter\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png\",\"datePublished\":\"2022-04-21T11:47:27+00:00\",\"dateModified\":\"2022-04-21T11:47:29+00:00\",\"description\":\"WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/wmeye\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WMEye : A Post Exploitation Tool That Uses WMI Event Filter","description":"WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/wmeye\/","og_locale":"en_US","og_type":"article","og_title":"WMEye : A Post Exploitation Tool That Uses WMI Event Filter","og_description":"WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement.","og_url":"https:\/\/kalilinuxtutorials.com\/wmeye\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-04-21T11:47:27+00:00","article_modified_time":"2022-04-21T11:47:29+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"WMEye : A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement","datePublished":"2022-04-21T11:47:27+00:00","dateModified":"2022-04-21T11:47:29+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/"},"wordCount":278,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/wmeye\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/","url":"https:\/\/kalilinuxtutorials.com\/wmeye\/","name":"WMEye : A Post Exploitation Tool That Uses WMI Event Filter","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","datePublished":"2022-04-21T11:47:27+00:00","dateModified":"2022-04-21T11:47:29+00:00","description":"WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral Movement.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/wmeye\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/wmeye\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh1kiSBrLJnr69VfzwpO_XUYfdACO0famqEAqn6yGictD6fGSKodnzOLYc4Sqpyf3W3bhRM2fRgCUssHkjf4D21whLKvCrptywzyFAeJQPb1lDkWczFKm43r8dPJtrT0ZCV1_BKkebURMRdf_Mx3zoGWNBsWI9ZXn5RtvucTDce3rBmS1XdV7JWTN0\/s728\/communityIcon_a802mqqj9t551.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":12536,"url":"https:\/\/kalilinuxtutorials.com\/movekit\/","url_meta":{"origin":24080,"position":0},"title":"MoveKit : Cobalt Strike Kit For Lateral Movement","author":"R K","date":"April 23, 2021","format":false,"excerpt":"Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies. The aggressor script handles payload creation by reading the template files for a specific execution type. IMPORTANT: To use the script a user will only need to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30826,"url":"https:\/\/kalilinuxtutorials.com\/latloader\/","url_meta":{"origin":24080,"position":1},"title":"LatLoader &#8211; Evading Elastic EDR In Lateral Movement","author":"Varshini","date":"October 13, 2023","format":false,"excerpt":"LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this project is to help others learn BOF and Havoc module development. This project can also help others understand basic EDR rule evasions, particularly when performing lateral movement. The\u00a0sideload\u00a0subcommand is the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36256,"url":"https:\/\/kalilinuxtutorials.com\/stuxnet\/","url_meta":{"origin":24080,"position":2},"title":"Stuxnet : The Blueprint Of Modern WMI-Based Cyber Threats","author":"Varshini","date":"February 10, 2025","format":false,"excerpt":"Stuxnet, a groundbreaking cyberweapon first discovered in 2010, targeted Iran's nuclear facilities, marking a significant evolution in cyber warfare. It exploited four zero-day vulnerabilities to infiltrate Windows systems and Siemens PLCs, executing highly specific sabotage while remaining stealthy. Its modular design allowed it to propagate through USB drives and networks,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Stuxnet.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Stuxnet.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Stuxnet.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Stuxnet.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Stuxnet.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Stuxnet.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":13758,"url":"https:\/\/kalilinuxtutorials.com\/tchopper\/","url_meta":{"origin":24080,"position":3},"title":"TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine","author":"R K","date":"June 21, 2021","format":false,"excerpt":"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services display name and WMI by smuggling the malicious binary as base64 chunks and automate the process using the TChopper tool. How It Works the tool will get the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13107,"url":"https:\/\/kalilinuxtutorials.com\/cimplant\/","url_meta":{"origin":24080,"position":4},"title":"CIMplant : C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote Systems","author":"R K","date":"May 28, 2021","format":false,"excerpt":"C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session. Note: Some commands will use PowerShell in combination with WMI, denoted with ** in the\u00a0--show-commands\u00a0command. Introduction CIMplant is a C# rewrite and expansion on\u00a0@christruncer's\u00a0WMImplant. It allows\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":18219,"url":"https:\/\/kalilinuxtutorials.com\/sharpstrike\/","url_meta":{"origin":24080,"position":5},"title":"SharpStrike : A Post Exploitation Tool Written In C# Uses Either CIM Or WMI To Query Remote Systems","author":"R K","date":"September 22, 2021","format":false,"excerpt":"SharpStrike is a post-exploitation tool written in C# that uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session. Note: Some commands will use PowerShell in combination with WMI, denoted with ** in the\u00a0--show-commands\u00a0command. Introduction SharpStrike is a C# rewrite and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-OQPnxnI2zxo\/YTnbXD87p4I\/AAAAAAAAKxM\/97q0ahE6QgUJ3ihcNW9n9P3n2-PDxfRogCLcBGAsYHQ\/s728\/download.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-OQPnxnI2zxo\/YTnbXD87p4I\/AAAAAAAAKxM\/97q0ahE6QgUJ3ihcNW9n9P3n2-PDxfRogCLcBGAsYHQ\/s728\/download.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-OQPnxnI2zxo\/YTnbXD87p4I\/AAAAAAAAKxM\/97q0ahE6QgUJ3ihcNW9n9P3n2-PDxfRogCLcBGAsYHQ\/s728\/download.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-OQPnxnI2zxo\/YTnbXD87p4I\/AAAAAAAAKxM\/97q0ahE6QgUJ3ihcNW9n9P3n2-PDxfRogCLcBGAsYHQ\/s728\/download.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=24080"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24080\/revisions"}],"predecessor-version":[{"id":24255,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24080\/revisions\/24255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/24085"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=24080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=24080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=24080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}