bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence Logo

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence

0
Free
Visit Website

Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence Over the last few weeks, I researched and tested a few interesting namespaces/methods documented on various Microsoft/MSDN sources that dealt with executing various COM scripts/scriptlets (e.g. VBscript, Jscript, etc.). In particular, I was curious to see if there were potentially new ways to invoke remote scripts (ActiveX Objects) by leveraging some of the great research already performed and documented by @subTee, @Oddvarmoe, @ItsReallyNick, @KyleHanslovan, @ChrisBisnett, and @NickTyrer. There were some interesting findings, but the one that really stood out was the discovery of LaunchINFSection, a ‘new’ method to remotely launch staged SCT files configured within INF files. In this post, we’ll discuss several known INF-SCT launch methods, introduce LaunchINFSection, and dive into use cases/defensive considerations. Additionally, we’ll reference other techniques for remote script/scriptlet execution. INF-SCT Launch Methods Methods for launching script component files (‘.sct’) via INF configuration files include InstallHinfSection (setupapi.dll), CMSTP, and LaunchINFSection (advpack.dll). Let’s dive in… Malicious INF-SCT Usage with Infected INF Files

FEATURES

ALTERNATIVES

A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities

A powerful tool for identifying and exploiting Cross-Site Scripting (XSS) vulnerabilities.

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

A software reverse engineering framework with full-featured analysis tools and support for multiple platforms, instruction sets, and executable formats.

Boomerang Decompiler is a machine code decompiler supporting various architectures and file formats, with a focus on high-level language output.

A blind SQL injection tool written in Golang

A library of PHP unserialize() payloads and a tool to generate them.

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.