View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0003114 | Kali Linux | New Tool Requests | public | 2016-03-03 10:24 | 2020-03-30 14:39 |
| Reporter | ycam | Assigned To | |||
| Priority | normal | Severity | feature | Reproducibility | N/A |
| Status | closed | Resolution | won't fix | ||
| Summary | 0003114: exe2powershell - exe2bat reborn for modern Windows | ||||
| Description | exe2powershell - exe2bat reborn for modern Windows exe2powershell converts a binary into a bat file, without size limitation (64kB) and with compatibility to modern Windows (7 x64, 8, 8.1, 10, 2008, 2008R2, 2012). The *.bat produced by exe2powershell contains several "echo" lines (< 128 chars) of the decimal code of initial binary, and finally invoke a powershell command line to regenerate the payload.exe on the remote server through command line.
exe2powershell on github with source-code, sample and binaries : | ||||
| Steps To Reproduce | C:\exe2powershell\bin>exe2powershell.exe | __| | | \ / __| | | | |
[ initial author ninar1, based on riftor work, and modernized by ycam ] [] Usage : exe2powershell.exe inputfile outputfile | ||||
| Additional Information | Kali integrates many Windows binaries used during pentest on Windows Server. One of these tools, the oldschool "exe2bat.exe" is present here : /usr/share/windows-binaries/exe2bat.exe Through this old tool, a pentester can convert a payload.exe or another utility (ftp.exe, tftp.exe, nc.exe, etc.) into a .bat file. Through this tool "exe2bat", a pentester can "upload" a payload.exe only with the use of "echo" and "debug" command in a shell. But "exe2bat" have limitation :
Compared to these limitations of "exe2bat", I've created "exe2powershell", the reborn of "exe2bat". exe2powershell converts a binary into a bat, without size limitation (64kB) and with compatibility to modern Windows (7 x64, 8, 8.1, 10, 2008, 2008R2, 2012). The *.bat produced by exe2powershell contains several "echo" lines of the decimal code of initial binary, and finally invokes a powershell command line to regenerate the payload.exe. I think this tool can be useful to pentester who used to use exe2bat, so I suggest you to include it among the other Windows binaries in /usr/share/windows-binaries/. Sincerely, | ||||
|
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
|
|
|
Tool hasn't had an update for a while. Other than post exploitation, why would a binary exe be used. |
|
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2016-03-03 10:24 | ycam | New Issue | |
| 2018-01-29 14:54 | g0tmi1k | Note Added: 0008390 | |
| 2018-02-21 09:35 | g0tmi1k | Product Version | 2016.1 => |
| 2018-02-24 11:32 | ycam | Note Added: 0008804 | |
| 2020-03-30 14:39 | g0tmi1k | Note Added: 0012568 | |
| 2020-03-30 14:39 | g0tmi1k | Status | new => closed |
| 2020-03-30 14:39 | g0tmi1k | Resolution | open => won't fix |