diff options
author | Bryan McNulty <bryanmcnulty@protonmail.com> | 2025-04-19 16:03:33 -0500 |
---|---|---|
committer | Bryan McNulty <bryanmcnulty@protonmail.com> | 2025-04-19 16:03:33 -0500 |
commit | 82fc125fd02f236481b0fa581047979fc2845898 (patch) | |
tree | bf8fe1e0f5f083493bd4d840ed132cf0d5c9ecc6 /cmd | |
parent | b5bf849b3110304f5c84f915d5e19e57c2a0cc96 (diff) | |
download | goexec-82fc125fd02f236481b0fa581047979fc2845898.tar.gz goexec-82fc125fd02f236481b0fa581047979fc2845898.zip |
Updated DCOM description + ctx
Diffstat (limited to 'cmd')
-rw-r--r-- | cmd/dcom.go | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/cmd/dcom.go b/cmd/dcom.go index 9b94043..6d2643b 100644 --- a/cmd/dcom.go +++ b/cmd/dcom.go @@ -57,12 +57,6 @@ var ( Long: `Description: The mmc method uses the exposed MMC20.Application object to call Document.ActiveView.ShellExec, and ultimately spawn a process on the remote host. - -References: - - https://www.scorpiones.io/articles/lateral-movement-using-dcom-objects - - https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/ - - https://github.com/fortra/impacket/blob/master/examples/dcomexec.py - - https://learn.microsoft.com/en-us/previous-versions/windows/desktop/mmc/view-executeshellcommand `, Args: args( argsRpcClient("host"), @@ -72,7 +66,10 @@ References: dcomMmc.Dcom.Client = &rpcClient dcomMmc.IO = exec - ctx := log.WithContext(gssapi.NewSecurityContext(context.TODO())) + ctx := log.With(). + Str("module", "dcom"). + Str("method", "mmc"). + Logger().WithContext(gssapi.NewSecurityContext(context.Background())) if err := goexec.ExecuteCleanMethod(ctx, &dcomMmc, &exec); err != nil { log.Fatal().Err(err).Msg("Operation failed") |