Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. PoshC2

PoshC2

PoshC2 is an open source remote administration and post-exploitation framework that is publicly available on GitHub. The server-side components of the tool are primarily written in Python, while the implants are written inPowerShell. AlthoughPoshC2 is primarily focused on Windows implantation, it does contain a basic Python dropper for Linux/macOS.[1]

ID: S0378
Type: TOOL
Platforms: Windows, Linux, macOS
Version: 1.3
Created: 23 April 2019
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

PoshC2 can utilize multiple methods to bypass UAC.[1]

EnterpriseT1134Access Token Manipulation

PoshC2 can use Invoke-TokenManipulation for manipulating tokens.[1]

.002Create Process with Token

PoshC2 can use Invoke-RunAs to make tokens.[1]

EnterpriseT1087.001Account Discovery:Local Account

PoshC2 can enumerate local and domain user account information.[1]

.002Account Discovery:Domain Account

PoshC2 can enumerate local and domain user account information.[1]

EnterpriseT1557.001Adversary-in-the-Middle:LLMNR/NBT-NS Poisoning and SMB Relay

PoshC2 can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.[1]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

PoshC2 can use protocols like HTTP/HTTPS for command and control traffic.[1]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

PoshC2 contains a module for compressing data using ZIP.[1]

EnterpriseT1119Automated Collection

PoshC2 contains a module for recursively parsing through files and directories to gather valid credit card numbers.[1]

EnterpriseT1110Brute Force

PoshC2 has modules for brute forcing local administrator and AD user accounts.[1]

EnterpriseT1555Credentials from Password Stores

PoshC2 can decrypt passwords stored in the RDCMan configuration file.[2]

EnterpriseT1482Domain Trust Discovery

PoshC2 has modules for enumerating domain trusts.[1]

EnterpriseT1546.003Event Triggered Execution:Windows Management Instrumentation Event Subscription

PoshC2 has the ability to persist on a system using WMI events.[1]

EnterpriseT1068Exploitation for Privilege Escalation

PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099.[1]

EnterpriseT1210Exploitation of Remote Services

PoshC2 contains a module for exploiting SMB via EternalBlue.[1]

EnterpriseT1083File and Directory Discovery

PoshC2 can enumerate files on the local file system and includes a module for enumerating recently accessed files.[1]

EnterpriseT1056.001Input Capture:Keylogging

PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.[1]

EnterpriseT1046Network Service Discovery

PoshC2 can perform port scans from an infected host.[1]

EnterpriseT1040Network Sniffing

PoshC2 contains a module for taking packet captures on compromised hosts.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

PoshC2 contains an implementation ofMimikatz to gather credentials from memory.[1]

EnterpriseT1201Password Policy Discovery

PoshC2 can useGet-PassPol to enumerate the domain password policy.[1]

EnterpriseT1069.001Permission Groups Discovery:Local Groups

PoshC2 contains modules, such asGet-LocAdm for enumerating permission groups.[1]

EnterpriseT1055Process Injection

PoshC2 contains multiple modules for injecting into processes, such asInvoke-PSInject.[1]

EnterpriseT1090Proxy

PoshC2 contains modules that allow for use of proxies in command and control.[1]

EnterpriseT1082System Information Discovery

PoshC2 contains modules, such asGet-ComputerInfo, for enumerating common system information.[1]

EnterpriseT1016System Network Configuration Discovery

PoshC2 can enumerate network adapter information.[1]

EnterpriseT1049System Network Connections Discovery

PoshC2 contains an implementation ofnetstat to enumerate TCP and UDP connections.[1]

EnterpriseT1007System Service Discovery

PoshC2 can enumerate service and service permission information.[1]

EnterpriseT1569.002System Services:Service Execution

PoshC2 contains an implementation ofPsExec for remote execution.[1]

EnterpriseT1552.001Unsecured Credentials:Credentials In Files

PoshC2 contains modules for searching for passwords in local and remote files.[1]

EnterpriseT1550.002Use Alternate Authentication Material:Pass the Hash

PoshC2 has a number of modules that leverage pass the hash for lateral movement.[1]

EnterpriseT1047Windows Management Instrumentation

PoshC2 has a number of modules that use WMI to execute tasks.[1]

Groups That Use This Software

IDNameReferences
G0064APT33

[3][4]

G0034Sandworm Team

Sandworm Team has used multiple publicly available tools during operations, such as PoshC2.[5]

G1001HEXANE

[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp