Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques

TL;DR There are several ways that attackers can leverage COM hijacking to influence evasive loading and hidden persistence.  A few examples include CLSID (sub)key abandonment referencing, key overriding, and key linking. There are several programs and utilities that can invoke COM registry payloads including Rundll32.exe, Xwizard.exe, Verclsid.exe, Mmc.exe, and the Task Scheduler.  In the traditional … Continue reading Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques

Capturing NetNTLM Hashes with Office [DOT] XML Documents

TL;DR An Office XML (.xml) document can call a remote XSL stylesheet over SMB.  If this occurs against an attacker controlled server, the net-NTLM authentication hash (challenge/response) of that user is revealed.  Operationally, an attacker could crack this offline or leverage a relay technique for remote command execution (if privileged and on-net).  There are possible … Continue reading Capturing NetNTLM Hashes with Office [DOT] XML Documents

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

TL;DR Vendors are notorious for including and/or leaving behind Registry artifacts that could potentially be abused by attackers for lateral movement, evasion, bypass, and persistence. CLSIDs subkeys (LocalServer32 and InprocServer32) can be enumerated to discover abandoned binary references. Interestingly, CLSIDs can be called ('invoked') with this command: rundll32.exe -sta {CLSID} Defensive recommendations - clean up … Continue reading Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Abusing DCOM For Yet Another Lateral Movement Technique

TL;DR This post discusses an alternate DCOM lateral movement discovery and payload execution method.  The primary gist is to locate DCOM registry key/values that point to the path of a binary on the 'remote' machine that does not exist.  This example method is likely to work if mobsync.exe is not in \\target\admin$\system32\, which is default … Continue reading Abusing DCOM For Yet Another Lateral Movement Technique

DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction

[Source: blog.microsoft.com] Introduction Not long ago, I blogged about Vshadow: Abusing the Volume Shadow Service for Evasion, Persistence, and Active Directory Database Extraction.  This tool was quite interesting because it was yet another utility to perform volume shadow copy operations, and it had a few other features that could potentially support other offensive use cases.  … Continue reading DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

Background Last Wednesday, I had some down time so I decided to hunt around in \System32 to see if I could find anything of potential interest.  I located a few DLL files that shared an interesting export function called OpenURL: While looking for a quick win, I wanted to see if anything could be invoked … Continue reading Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)

Introduction Two weeks ago, I blogged about several "pass-thru" techniques that leveraged the use of INF files ('.inf') to "fetch and execute" remote script component files ('.sct').  In general, instances of these methods could potentially be abused to bypass application whitelisting (AWL) policies (e.g. Default AppLocker policies), deter host-based security products, and achieve 'hidden' persistence.  … Continue reading Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)