Skip to content

Conversation

@h00die
Copy link
Contributor

@h00die h00die commented Nov 19, 2025

Updates the windows wmi persistence to the new mixin. The original persistence worked in several different and very cool ways, and I felt it would be best to split them out instead of complicating the datastore based on which technique was chosen. Part of #20374

@NickTyrer not sure if you are still around, but I love this module, its stealthy, the module was well written and easy to follow. Props from future!

As noted in the files:
wmic will be removed Windows 11, version 25H2 or Windows 11, version 24H2 in favor of powershell
source https://support.microsoft.com/en-us/topic/windows-management-instrumentation-command-line-wmic-removal-from-windows-e9e83c7f-4992-477f-ba1d-96f694b8665d

To Do:

Finish testing each module (only event_log is done)
Write docs
Make cleanup work (currently failing)

Verification

  • Start msfconsole
  • exploit the box somehow
  • use exploit/windows/persistence/wmi/<select a module>
  • set SESSION <id>
  • exploit
  • Verify persistence is created, and you get a new session after doing the trigger
  • Verify cleanup works
  • Document is updated and correct

@NickTyrer
Copy link
Contributor

Thanks for the kind words and updating the module.

@h00die h00die marked this pull request as ready for review November 30, 2025 16:10
@h00die
Copy link
Contributor Author

h00die commented Nov 30, 2025

Ready for review!

@h00die h00die changed the title update windows wmi to persistence mixin Update windows wmi to persistence mixin Nov 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants