Skip to main content

A Tool for automating the MITM attack on the WSUS connection

Project description

Supported Python versions Twitter

wsuks

Weaponizing the WSUS Attack

Gaining local administrative access on a Windows machine that is part of a domain is typically the initial step towards acquiring domain admin privileges during a penetration test. In order to exploit the WSUS attack automatically, this tool spoofs the IP address of the WSUS server within the network using ARP, and when the client requests Windows updates, it provides its own malicious updates instead. By default, a Windows client requests updates every 24 hours.

Both the executable file served (Default: PsExec64.exe) and the executed command can be changed as needed.

Prerequisits:

  • The target Client must be on the local network
  • The Windows Server Update Service (WSUS) must be configured using HTTP

Result:

  • After successful execution a user with the format user[0-9]{5} (e.g. user12345) and a random password will be created and added to the local admin group

Installation

Using pipx:

sudo apt install python3-pipx
pipx ensurepath
pipx install wsuks
sudo ln -s ~/.local/pipx/venvs/wsuks/bin/wsuks /usr/local/bin/wsuks

Using poetry:

sudo apt install python3-poetry
git clone https://github.com/NeffIsBack/wsuks
cd wsuks
sudo poetry install

Usage

❗wsuks must be run as root❗

With pipx:

sudo wsuks
suso wsuks -t 10.0.0.10 --WSUS-Server 10.0.0.20

With poetry:

sudo poetry run wsuks
sudo poetry run wsuks -t 10.0.0.10 --WSUS-Server 10.0.0.20

About & Mitigation

In the PyWSUS Repository from GoSecure you can find a great documentation how to you could detect and mitigate this attack. They also wrote a great Guide demonstrating how this attack works in detail here.

This Tool is based on the following projects:

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wsuks-0.2.2.tar.gz (761.3 kB view details)

Uploaded Source

Built Distribution

wsuks-0.2.2-py3-none-any.whl (768.3 kB view details)

Uploaded Python 3

File details

Details for the file wsuks-0.2.2.tar.gz.

File metadata

  • Download URL: wsuks-0.2.2.tar.gz
  • Upload date:
  • Size: 761.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.2 CPython/3.11.2 Linux/6.1.0-kali9-amd64

File hashes

Hashes for wsuks-0.2.2.tar.gz
Algorithm Hash digest
SHA256 8400c64dc26a18970268e3252f998be77312c7fb82325bde951f2385dd81ed4e
MD5 d699f5f7106116373f594fdeff830efb
BLAKE2b-256 e3946aa4642df7fdb43a862499313fb0a939dad8ed947791ff49c3398533931e

See more details on using hashes here.

File details

Details for the file wsuks-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: wsuks-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 768.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.2 CPython/3.11.2 Linux/6.1.0-kali9-amd64

File hashes

Hashes for wsuks-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 b8e3561a852ca65c73613f078cab1b8010f6fea6851c076523cc7138a288c48f
MD5 4427a39c594d78e97c73bf6d8399783e
BLAKE2b-256 86589626da95f9229c451b034a9499656290acaa40467e26c758d11d26183a8d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page