DVS lets you list vulnerable remote DCOM functions, launch them, and even launch attacks using its tools.

DVS contains several ways to bypass remote hardening against DCOM, reactivating remote DCOM access and automatically granting the required permissions to the attacking user.
DVS can also restore changes to the remote machine to its original state before the attack, hiding the changes it has made.
Εργαλεία
- Security rights analyzer
- Remote grant access
- DCOM Scanner
- DCOM
- Report
- Command Execution
Installation
git clone https://github.com/ScorpionesLabs/DVS |
|
powershell -ep bypass |
|
PS> Import-modules .\ DVS.psm1 |
|
PS> Get-Help Invoke-DCOMObjectScan -Detailed # Get details of the Invoke-DCOMObjectScan command |
|
PS> Get-Help Get-ExecutionCommand -Detailed # Get details of the Get-ExecutionCommand command |
|
PS> Get-Help Invoke-ExecutionCommand -Detailed # Get details of the Invoke-ExecutionCommand command |
|
PS> Get-Help Invoke-RegisterRemoteSchema -Detailed # Get details of the Invoke-RegisterRemoteSchema command |
Application snapshots
Video guide
Tested operating systems
- Windows 7 SP1
- Windows 8.1
- Windows 10
- Windows Server 2019
More information about the program, you will find here.
Read them Technology News from all over the world, with the validity of iGuRu.gr
Follow us on Google News
Comment Policy:
IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators