Automating the MITM attack on WSUS
Project description
wsuks
Automating the WSUS Attack
Gaining local administrative access to a domain-joined Windows machine is typically the first step during a penetration test. In many cases, the Windows Server Update Service (WSUS) is configured to deploy updates to clients over the local network using HTTP. Without the security of HTTPS, an attacker can mount a machine-in-the-middle attack to serve an update to the client, which will then execute with SYSTEM privileges. Any Microsoft signed executable can be served as an update, including a custom command with which the executable is executed. Should an attacker be able to obtain a TLS-certificate for the WSUS server, this technique can also be performed over HTTPS (see ESC17 and our blog post).
To automatically exploit the WSUS attack, this tool spoofs the IP address of the WSUS server on the network using ARP, and when the targeted client requests Windows updates, it serves PsExec64.exe with a predefined PowerShell script to gain local admin privileges. Both the executable file that is served (default: PsExec64.exe) and the command that is executed can be changed if required.
By default, a Windows client will check for updates approximately every 24 hours.
Prerequisits:
- The target client must be on the local network
- The Windows Server Update Service (WSUS) must be configured using HTTP or ESC17 must be present
Result:
- After successful execution the user provided will be added to the local admin group. If no user was specified a user with the format user[0-9]{5} (e.g. user12345) and a random password will be created
Implemented features:
- ARP spoofing the target
- Routing the ARP spoofed packets to the local HTTP(S) server
- HTTP(S) server to serve the malicious updates
- Automatic detection of the WSUS server
- Included PowerShell script and executable to gain local admin access
Installation 🖥️
Using pipx (recommended):
sudo apt install pipx python3-nftables
pipx ensurepath
pipx install wsuks --system-site-packages
sudo ln -s ~/.local/bin/wsuks /usr/local/sbin/wsuks
Using poetry:
sudo apt install pipx git python3-nftables # poetry should still be installed with pipx, but apt will work as well
sudo pipx install poetry
sudo ln -s /root/.local/bin/poetry /usr/local/sbin/poetry
git clone https://github.com/NeffIsBack/wsuks
cd wsuks
sudo poetry install
Usage 🛠️
❗wsuks must be run as root❗
With pipx, you can just run sudo wsuks ... anywhere on the system.
If you are using poetry, you must be in the wsuks folder and start each command with sudo poetry run wsuks ...
This tool requires the nftables package to be installed, which is the default on all debian based systems.\
There are 3 different modes/attack scenarios in which wsuks can be run:
- AUTOMATIC: If the WSUS server is not known, wsuks will automatically discover the WSUS server by parsing the GPOs on the domain controller. In this case, the IP of the domain controller must be provided, as well as credentials for the domain.
- MANUAL: If the WSUS server is already known, the attack can be performed by simply providing the IP of the WSUS server.
- SERVE ONLY: If the traffic is already being redirected to the attacker's machine (e.g. with control over DNS), wsuks can be used to only serve the malicious executable and command.
AUTOMATIC: Autodiscover the WSUS Server by only specifying the domain user with the DC IP:
If you already have a domain user, wsuks will parse the GPOs on the domain controller to find the WSUS server.
A PowerShell script is executed, which will add the provided domain user to the local admin group.
sudo wsuks -t 10.0.0.10 -u User -p Password -d domain.local --dc-ip 10.0.0.1
Tipp: If you only want to check for a WSUS server, you can use the --only-discover flag.
MANUAL: Specify known WSUS Server and create local admin user:
The predefined PowerShell script will execute the following actions:
- Create a new user of the format user[0-9]{5} (e.g. user12345) and a random password
- Set the LocalAccountTokenFilterPolicy to 1 (disabling UAC ⚠)
- Add the created user to the local admin group
⚠ Before setting the LocalAccountTokenFilterPolicy to 1, the original value is stored in the user description field so that it can be restored later
sudo wsuks -t 10.0.0.10 --WSUS-Server 10.0.0.20
MANUAL: Specify known WSUS Server and add provided domain user to local admin group (domain is required!):
If you already have a domain user and you know the IP of the WSUS server, wsuks will simply add the user to the local Administrators group.
sudo wsuks -t 10.0.0.10 --WSUS-Server 10.0.0.20 -u User -d domain.local
SERVE ONLY: Only serve the malicious executable and command:
If the traffic is already being redirected to the attacker's machine (e.g. with control over DNS), wsuks can be used to only serve the malicious executable and command without performing the ARP spoofing and routing itself. This will simply spawn the HTTP server on the provided interface.
sudo wsuks --serve-only
ESC17: Specify a TLS certificate for the WSUS webserver (ESC17):
In the case an attacker is able to obtain a TLS certificate (e.g. through ESC17) for the WSUS server, the attack can be performed over HTTPS as well.
Applies to all of the scenarios above, just add the --tls-cert flag with the path to the certificate.
sudo wsuks -t 10.0.0.10 --WSUS-Server secure.wsus.domain.local --tls-cert cert.pem
Demo 🎥
Here is a short demo of the attack with a known WSUS server:
About & Mitigation 🛡️
In the PyWSUS repository from GoSecure you can find a great documentation how you could detect and mitigate this attack. They also wrote a great Guide demonstrating how this attack works in detail here.
Regarding ESC17, please check out the certipy wiki for mitigation recommendations.
Parts of this tool are based on the following projects:
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file wsuks-1.2.1.tar.gz.
File metadata
- Download URL: wsuks-1.2.1.tar.gz
- Upload date:
- Size: 769.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/2.3.2 CPython/3.13.12 Linux/6.18.12+kali-amd64
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
445a780ab898e75762ee58c42af42881fa9f0ba6566fbaac390666b41ff232df
|
|
| MD5 |
1aae9003eedf68208edbbf307e46ba3e
|
|
| BLAKE2b-256 |
70f73a8cf5ec67ec24cd60d8a36ff4e67c12e933bc1e3776abcb61356374a2c3
|
File details
Details for the file wsuks-1.2.1-py3-none-any.whl.
File metadata
- Download URL: wsuks-1.2.1-py3-none-any.whl
- Upload date:
- Size: 776.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/2.3.2 CPython/3.13.12 Linux/6.18.12+kali-amd64
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
35dce8b17f245ad564dabc7e4c29e9d8907dba7f0374f80ea0eb2fcaddb50023
|
|
| MD5 |
68bba32390af358e40fcd071acaee8fe
|
|
| BLAKE2b-256 |
322aaa679be7c13b6ec5f6c470bb738f87b286fd25b76e0015969b894dcf44c7
|