ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution Logo

ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution

0
Free
Visit Website

ClickOnce is a Microsoft technology that enables the user to install and run a Windows-based smart client application by clicking a link in a web page. With a little bit of C# coding knowledge, a red teamer or penetration tester has yet another capability to add to their ethical hacker toolkit. What are the requirements for operational use? To get started with ClickOnce, we need to do our homework and get a few things prepared: For social engineering campaigns, Microsoft web browsers (Edge/Internet Explorer) are required to invoke the ClickOnce installer. Additionally, target organizations must have the appropriate version of .NET Framework installed to launch the respective payload.

FEATURES

ALTERNATIVES

A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.

A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.

Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.

A blog post about bypassing AppLocker using PowerShell diagnostic scripts

Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.

A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.

AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.