LOLBAS/yml/OtherMSBinaries/Csi.yml

29 lines
919 B
YAML
Raw Normal View History

2018-06-09 00:15:06 +02:00
---
Name: csi.exe
Description: Command line interface included with Visual Studio.
Author: 'Oddvar Moe'
2018-06-09 00:15:06 +02:00
Created: '2018-05-25'
Commands:
- Command: csi.exe file
Description: Use csi.exe to run unsigned C# code.
Usecase: Local execution of unsigned C# code.
Category: Execute
Privileges: User
MitreID: T1218
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem: Windows
2018-06-09 00:15:06 +02:00
Full Path:
- Path: c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe
- Path: c:\Program Files (x86)\Microsoft Web Tools\Packages\Microsoft.Net.Compilers.X.Y.Z\tools\csi.exe
Code Sample:
- Code:
Detection:
- IOC:
2018-06-09 00:15:06 +02:00
Resources:
- Link: https://twitter.com/subTee/status/781208810723549188
- Link: https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/
Acknowledgement:
- Person: Casey Smith
Handle: '@subtee'
---