SettingContent-MS File Execution vulnerability in Windows 10
Switch branches/tags
Nothing to show
Clone or download
bvoris Create LoadPowershellDemo.SettingContent-MS
This calls PowerShell, bypasses ExecutionPolicy and runs a For Loop that looks like its formatting a drive. This is another proof of concept for SettingContent-MS File Execution Vulernability
Latest commit 0e565e0 Jun 27, 2018

README.md

SettingContent-MS-File-Execution

SettingContent-MS File Execution vulnerability in Windows 10 Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 Download and execute LoadWebsite.SettingContent-MS Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload Vulnerability first discovered by Matt Nelson Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39