I hereby claim:
- I am nasbench on github.
- I am nasbench (https://keybase.io/nasbench) on keybase.
- I have a public key ASCERZHjJ7mUyROvWgr41hlUXh_byMkTO918VVCAtXhxbgo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
using System.Diagnostics; | |
using Fiddler; | |
[assembly: Fiddler.RequiredVersion("2.3.5.0")] | |
namespace POCFiddlerDotNet | |
{ | |
public class PersistencePOC : IFiddlerExtension | |
{ | |
public PersistencePOC() { } |
<ADPlus Version='2'> | |
<Settings> | |
<Option> FullOnFirst </Option> | |
<Runmode> Hang </Runmode> | |
<!-- | |
If you want to run the binary and not dump anything. | |
Then this can be any process as long as it's running | |
--> | |
<ProcessName> notepad.exe </ProcessName> | |
<OutputDir>C:\temp\</OutputDir> |
as AdpDumpDir C:\logs\20220609_183403_Crash_Mode | |
.logopen /t "${AdpDumpDir}\ADPlus_log.log" | |
as AdpOutputDir C:\logs | |
as AdpDumpDirEsc C:\\logs\\20220609_183403_Crash_Mode | |
as AdpTimeStamp 20220609_183403 | |
* | |
*----- OS and Time Information ---- | |
vertarget | |
* | |
* |
# Source: System.Management.Automation.dll | |
# This list is used to determin if a ScriptBlock contains potential suspicious content | |
# If a match is found an automatic 4104 with a "warning" level is generated. | |
# https://github.com/PowerShell/PowerShell/blob/master/src/System.Management.Automation/engine/runtime/CompiledScriptBlock.cs | |
- "Add-Type" | |
- "AddSecurityPackage" | |
- "AdjustTokenPrivileges" | |
- "AllocHGlobal" | |
- "BindingFlags" | |
- "Bypass" |
This binary can be used as a LOLBIN as described here.
both
, normal
or abnormal
). Since the switch
clause doesn't specify a default case. And the flag
variable is set to true
before the check.File.WriteAllText(args[1], process.Id.ToString());
ProcessStartInfo
and is executed Process.Start(startInfo);
. Hence anything can be calledThis binary can be used as a LOLBIN as described here
// Usage: --file <fullyResolvedPath> --processId <processId> --dumpType <dumpType>
Here are the steps to follow in order to create a malicious CHM file. As used by APT37
C:\Program Files (x86)\HTML Help Workshop
and inside the Microsoft HTML Help Compiler (hhc.exe)
.hpp
.htm
.hhc
You can execute commands in the context of an AppX Package to gain access to it's virtualized resources (example virtualized registry keys or files)
800, AntiVirus | |
801, AntiSpyware | |
802, Antimalware | |
803, Full | |
804, Delta | |
805, Full Scan | |
806, Quick Scan | |
807, Custom Scan | |
808, Remove | |
809, Quarantine |