From b91c7ddab5184d47b8e8fbcaf17350d93ad71072 Mon Sep 17 00:00:00 2001 From: Oddvar Moe Date: Tue, 26 Oct 2021 00:17:08 +0200 Subject: [PATCH] Updated msbuild with logger technique --- yml/OSBinaries/Msbuild.yml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/yml/OSBinaries/Msbuild.yml b/yml/OSBinaries/Msbuild.yml index 72e185a..5d6dde3 100644 --- a/yml/OSBinaries/Msbuild.yml +++ b/yml/OSBinaries/Msbuild.yml @@ -20,6 +20,22 @@ Commands: MitreID: T1127 MitreLink: https://attack.mitre.org/wiki/Technique/T1127 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 + - Command: msbuild.exe @sample.rsp + Description: Executes Logger statements from rsp file + Usecase: Execute DLL + Category: Execute + Privileges: User + MitreID: T1127 + MitreLink: https://attack.mitre.org/wiki/Technique/T1127 + OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 + - Command: msbuild.exe /logger:TargetLogger,C:\Loggers\TargetLogger.dll;MyParameters,Foo + Description: Executes generated Logger dll file with TargetLogger export + Usecase: Execute DLL + Category: Execute + Privileges: User + MitreID: T1127 + MitreLink: https://attack.mitre.org/wiki/Technique/T1127 + OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 - Command: msbuild.exe project.proj Description: Execute jscript/vbscript code through XML/XSL Transformation. Requires Visual Studio MSBuild v14.0+. Usecase: Execute project file that contains XslTransformation tag parameters @@ -46,6 +62,7 @@ Resources: - Link: https://pentestlab.blog/2017/05/29/applocker-bypass-msbuild/ - Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/ - Link: https://gist.github.com/bohops/4ffc43a281e87d108875f07614324191 + - Link: https://github.com/LOLBAS-Project/LOLBAS/issues/165 Acknowledgement: - Person: Casey Smith Handle: '@subtee'