Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement Logo

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

0
Free
Visit Website

Last Wednesday, I had some down time so I decided to hunt around in System32 to see if I could find anything of potential interest. I located a few DLL files that shared an interesting export function called OpenURL: While looking for a quick win, I wanted to see if anything could be invoked without much effort. Sure enough, url.dll allowed for the execution an HTML application (.hta) using these commands: rundll32.exe url.dll,OpenURL "local\path\to\harmless.hta" rundll32.exe url.dll,OpenURLA "local\path\to\harmless.hta" After a few more functional tests across platforms, I (prematurely) posted this on Twitter, and the initial feedback was incredibly fast, educational, and humbling. On one hand, I should have went through a few more test routines to understand what was actually happening under the hood prior to posting. Conversely, it was incredible to see the instant reaction from some of the best practitioners in the field who helped triage this in what seemed like a matter of minutes. Big thanks to @subTee, @r0wdy_, and @Hexacorn for their rapid analysis! In short, the HTA was invoked using the OpenURL function, allowing for pass-thru command execution and lateral movement.

FEATURES

ALTERNATIVES

Tool for attacking Active Directory environments through SQL Server access.

Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.

A full-featured reconnaissance framework for web-based reconnaissance with a modular design.

A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.

Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

A subdomain enumeration tool for penetration testers and security researchers.

Preparation process for participating in the Pacific Rim CCDC 2015.