DCOMUploadExec is a proof-of-concept (PoC) tool designed to exploit the Distributed Component Object Model (DCOM) for lateral movement within a network.
By leveraging the IMsiServer interface, this tool demonstrates how attackers can abuse Windows Installer’s COM functionality to execute payloads on remote systems. Below is an overview of its functionality, usage, and limitations.
DCOMUploadExec consists of two key components:
This tool bypasses traditional methods like PsExec by exploiting the IMsiServer interface in msiexec.exe
, enabling attackers to upload and execute DLLs remotely.
msiexec.exe
process.InitializeEmbeddedUI
) from the DLL.DCOMUploadExec
and AssemblyPayload
).DCOMUploadExec.exe [domain]$$user]:[password]@[address]
DCOMUploadExec.exe LOCALHOST
To customize the payload:
InitializeEmbeddedUI
.PayloadConfig.h
with details of your custom payload:PAYLOAD_ASSEMBLY_PATH
: Path to your DLL.ASSEMBLY_NAME
: Name of your assembly.ASSEMBLY_BITNESS
: Specify “64” (x64) or “32” (x86).ASSEMBLY_VERSION
: Version obtained via tools like sigcheck.exe
.ASSEMBLY_PUBLIC_KEY
: Public key generated using sn.exe
.Recompile DCOMUploadExec to use this custom payload.
DCOMUploadExec highlights how attackers can exploit lesser-known COM interfaces like IMsiServer for lateral movement.
While it serves as a PoC, it underscores the importance of securing DCOM configurations, applying patches, and monitoring suspicious activity in enterprise environments.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…