View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0003114 | Kali Linux | New Tool Requests | public | 2016-03-03 10:24 | 2020-03-30 14:39 |
Reporter | ycam | Assigned To | |||
Priority | normal | Severity | feature | Reproducibility | N/A |
Status | closed | Resolution | won't fix | ||
Summary | 0003114: exe2powershell - exe2bat reborn for modern Windows | ||||
Description | exe2powershell - exe2bat reborn for modern Windows exe2powershell converts a binary into a bat file, without size limitation (64kB) and with compatibility to modern Windows (7 x64, 8, 8.1, 10, 2008, 2008R2, 2012). The *.bat produced by exe2powershell contains several "echo" lines (< 128 chars) of the decimal code of initial binary, and finally invoke a powershell command line to regenerate the payload.exe on the remote server through command line.
exe2powershell on github with source-code, sample and binaries : | ||||
Steps To Reproduce | C:\exe2powershell\bin>exe2powershell.exe | __| | | \ / __| | | | |
[ initial author ninar1, based on riftor work, and modernized by ycam ] [] Usage : exe2powershell.exe inputfile outputfile | ||||
Additional Information | Kali integrates many Windows binaries used during pentest on Windows Server. One of these tools, the oldschool "exe2bat.exe" is present here : /usr/share/windows-binaries/exe2bat.exe Through this old tool, a pentester can convert a payload.exe or another utility (ftp.exe, tftp.exe, nc.exe, etc.) into a .bat file. Through this tool "exe2bat", a pentester can "upload" a payload.exe only with the use of "echo" and "debug" command in a shell. But "exe2bat" have limitation :
Compared to these limitations of "exe2bat", I've created "exe2powershell", the reborn of "exe2bat". exe2powershell converts a binary into a bat, without size limitation (64kB) and with compatibility to modern Windows (7 x64, 8, 8.1, 10, 2008, 2008R2, 2012). The *.bat produced by exe2powershell contains several "echo" lines of the decimal code of initial binary, and finally invokes a powershell command line to regenerate the payload.exe. I think this tool can be useful to pentester who used to use exe2bat, so I suggest you to include it among the other Windows binaries in /usr/share/windows-binaries/. Sincerely, | ||||
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
|
|
Tool hasn't had an update for a while. Other than post exploitation, why would a binary exe be used. |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2016-03-03 10:24 | ycam | New Issue | |
2018-01-29 14:54 | g0tmi1k | Note Added: 0008390 | |
2018-02-21 09:35 | g0tmi1k | Product Version | 2016.1 => |
2018-02-24 11:32 | ycam | Note Added: 0008804 | |
2020-03-30 14:39 | g0tmi1k | Note Added: 0012568 | |
2020-03-30 14:39 | g0tmi1k | Status | new => closed |
2020-03-30 14:39 | g0tmi1k | Resolution | open => won't fix |