Regsvr32.exe (.sct) Application Whitelisting Bypass Server

Discussion in 'News Aggregator' started by Packet Storm, 17 Jun 2016.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module simplifies the Regsvr32.exe Application Whitelisting Bypass technique. The module creates a web server that hosts an .sct file. When the user types the provided regsvr32 command on a system, regsvr32 will request the .sct file and then execute the included PowerShell command. This command then downloads and executes the specified payload (similar to the web_delivery module with PSH). Both web requests (i.e., the .sct file and PowerShell download and execute) can occur on the same port.

    Continue reading...
     

Share This Page

Loading...