LOLBAS/yml/LOLUtilz/OtherBinaries/Nlnotes.yml

18 lines
612 B
YAML
Raw Normal View History

2018-06-09 00:15:06 +02:00
---
Name: Nlnotes.exe
Description: Execute
Author: ''
Created: '2018-05-25'
Categories: []
Commands:
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
Description: Run PowerShell via LotusNotes.
Full_Path:
2018-06-09 00:15:06 +02:00
- C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe
Code_Sample: []
2018-06-09 00:15:06 +02:00
Detection: []
Resources:
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
- https://twitter.com/HanseSecure/status/995578436059127808
Notes: Thanks to Daniel Bohannon - @danielhbohannon