skills/mukul975/anthropic-cybersecurity-skills/performing-lateral-movement-with-wmiexec/Gen Agent Trust Hub
performing-lateral-movement-with-wmiexec
Warn
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript usessubprocess.run()to execute system utilities and third-party security tools includingwmic,tshark, and Impacket'swmiexec. These executions are driven by user-supplied arguments which allow for command execution on target hosts.\n- [REMOTE_CODE_EXECUTION]: The skill provides instructions and automation for WMI-based lateral movement (T1047), allowing for remote command execution on Windows targets as demonstrated inrun_wmiexec_impacket. It also covers persistence via WMI event subscriptions.\n- [DATA_EXFILTRATION]:SKILL.mddescribes credential harvesting workflows, such as dumping SAM and SYSTEM registry hives to disk and extracting hashes withsecretsdump.py. These techniques involve the access and removal of sensitive system security data.\n- [EXTERNAL_DOWNLOADS]: The agent relies on external security packagesimpacketandpython-evtxfor its core functionality, with installation instructions provided in the skill documentation.
Audit Metadata