- Home
- Security Operations
- Offensive Security
- bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence Description
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence Over the last few weeks, I researched and tested a few interesting namespaces/methods documented on various Microsoft/MSDN sources that dealt with executing various COM scripts/scriptlets (e.g. VBscript, Jscript, etc.). In particular, I was curious to see if there were potentially new ways to invoke remote scripts (ActiveX Objects) by leveraging some of the great research already performed and documented by @subTee, @Oddvarmoe, @ItsReallyNick, @KyleHanslovan, @ChrisBisnett, and @NickTyrer. There were some interesting findings, but the one that really stood out was the discovery of LaunchINFSection, a ‘new’ method to remotely launch staged SCT files configured within INF files. In this post, we’ll discuss several known INF-SCT launch methods, introduce LaunchINFSection, and dive into use cases/defensive considerations. Additionally, we’ll reference other techniques for remote script/scriptlet execution. INF-SCT Launch Methods Methods for launching script component files (‘.sct’) via INF configuration files include InstallHinfSection (setupapi.dll), CMSTP, and LaunchINFSection (advpack.dll). Let’s dive in… Malicious INF-SCT Usage with Infected INF Files
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence FAQ
Common questions about bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence including features, pricing, alternatives, and user reviews.
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence is A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence. It is a Security Operations solution designed to help security teams with Binary Security.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox