Generalising file paths and urls, see #10 (#422)

This commit is contained in:
Wietze
2025-01-28 11:15:01 +00:00
committed by GitHub
parent e62749f81a
commit a79893e7ad
196 changed files with 555 additions and 758 deletions

View File

@@ -1,11 +1,11 @@
---
Name: Pester.bat
Description: Used as part of the Powershell pester
Author: 'Oddvar Moe'
Author: Oddvar Moe
Created: 2018-05-25
Commands:
- Command: Pester.bat [/help|?|-?|/?] "$null; notepad"
Description: Execute code using Pester. The third parameter can be anything. The fourth is the payload. Example here executes notepad
- Command: Pester.bat [/help|?|-?|/?] "$null; {CMD}"
Description: Execute code using Pester. The third parameter can be anything. The fourth is the payload.
Usecase: Proxy execution
Category: Execute
Privileges: User
@@ -13,8 +13,8 @@ Commands:
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: Pester.bat ;calc.exe
Description: Execute code using Pester. Example here executes calc.exe
- Command: Pester.bat ;{PATH:.exe}
Description: Execute code using Pester. Example here executes specified executable.
Usecase: Proxy execution
Category: Execute
Privileges: User
@@ -23,9 +23,7 @@ Commands:
Tags:
- Execute: EXE
Full_Path:
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\<version>\bin\Pester.bat
Code_Sample:
- Code:
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\<VERSION>\bin\Pester.bat
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_lolbin_pester_1.yml
Resources: