mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-10-01 07:45:36 -04:00
Add: Chasing Adversaries with Autoruns - evading techniques and countermeasures
This commit is contained in:
parent
61ae604e7a
commit
7ac3d19cc8
@ -485,6 +485,12 @@ _return-to-libc techniques_
|
|||||||
|
|
||||||
#### Post Exploitation Platform: Windows
|
#### Post Exploitation Platform: Windows
|
||||||
|
|
||||||
|
- [Chasing Adversaries with Autoruns – evading techniques and countermeasures](https://blogs.technet.microsoft.com/motiba/2017/11/04/chasing-adversaries-with-autoruns-evading-techniques-and-countermeasures/)
|
||||||
|
- **Nested commands technique**: chain multiple commands with `&`, `&&`, `||`
|
||||||
|
- **Abusing legitimate executables**: using legitimate executables to execute intended commands e.g.
|
||||||
|
- `Rundll32.exe`: `rundll32.exe shell32.dll,ShellExec_RunDLL notepad.exe`
|
||||||
|
- Program Compatibility Assistant (pcalua): `pcalua.exe -a calc.exe`
|
||||||
|
- `SyncAppvPublishingServer.vbs` or `SyncAppvPublishingServer.exe`: `SyncAppvPublishingServer.exe "n; Start-Process notepad.exe"`
|
||||||
- [Evading Microsoft’s AutoRuns](https://blog.conscioushacker.io/index.php/2017/10/25/evading-microsofts-autoruns/)
|
- [Evading Microsoft’s AutoRuns](https://blog.conscioushacker.io/index.php/2017/10/25/evading-microsofts-autoruns/)
|
||||||
- **Extension search order hijacking**: Manipulate extension search order which `.COM` has been looked for first before `.EXE` by making the actual `.EXE` disappeared and place dummy `.COM` with the same name as `.EXE` on the same directory
|
- **Extension search order hijacking**: Manipulate extension search order which `.COM` has been looked for first before `.EXE` by making the actual `.EXE` disappeared and place dummy `.COM` with the same name as `.EXE` on the same directory
|
||||||
- **PowerShell injection vulnerability**: Use `SyncAppvPublishingServer.exe` to execute powershell cmdlet e.g. `SyncAppvPublishingServer.exe ".; Start-Process calc.exe`
|
- **PowerShell injection vulnerability**: Use `SyncAppvPublishingServer.exe` to execute powershell cmdlet e.g. `SyncAppvPublishingServer.exe ".; Start-Process calc.exe`
|
||||||
|
Loading…
Reference in New Issue
Block a user