LOLBAS/Archive-Old-Version/LOLUtilz/OtherBinaries/Nlnotes.yml

19 lines
619 B
YAML
Raw Normal View History

2018-06-09 00:15:06 +02:00
---
Name: Nlnotes.exe
Description: Execute
Author: ''
Created: 2018-05-25
2018-06-09 00:15:06 +02:00
Commands:
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
Description: Run PowerShell via LotusNotes.
Full_Path:
2018-06-09 00:15:06 +02:00
- C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe
Code_Sample: []
2018-06-09 00:15:06 +02:00
Detection: []
Resources:
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
- https://twitter.com/HanseSecure/status/995578436059127808
2021-01-10 16:45:25 +01:00
Acknowledgement:
- Person: Daniel Bohannon
Handle: '@danielhbohannon'