Description
Description
Implement an exploiter that uses RDP to propagate to Windows hosts.
Tasks
- Add vulnerable 2 machines to terraform/GCP (0d) @ilija-lazoroski
- Password authentication
- PTH
- Test depth
- options (pydantic) @cakekoa
- determine what options RDP should have (0d)
- create a pydantic model for RDP options (0d)
- create a config schema (0d)
- Create plugin manifest (0d) @cakekoa
- Create a Pipfile for dependencies (0d) @cakekoa
- plugin.py (0d) @cakekoa
- command builder (0d) @cakekoa
- exploit client (0d) @ilija-lazoroski
- Don't forget to add MITRE tags
- Copy agent binary do Desktop if that avoids administrator privilege dialogues.
- Domain specification logic (0d)
- Make RDP64->65 propagation use PTH (0d)
- Add a jenkins job to build the plugin (0d) @ilija-lazoroski
- Update the island build jobs on Jenkins to copy the artifacts from the RDP plugin build job @cakekoa
- Update ETE test configurations (add to depth 2) (0d)
- Test
- Fix the RDP machine hostnames in the ansible scripts
- Investigate Credentials pair issue from UI
- Document the new exploiter (0d)