-
-
Notifications
You must be signed in to change notification settings - Fork 403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTA stager #34
Comments
What do you mean, like a payload that calls back to mshta.exe or a stagger that uses mshta.exe to get the agent on to the system? |
Stager to get the agent. |
So in one of the scripts you can use |
Can you specify which script you're talking about? |
Using ActiveXObject , do you mean by creating wscript.shell object ? |
You are talking about an hta correct. Htas are html applications. They live on local disk and are run inside of an stripped down IE window. The code that gets run is using |
I think this could be done: when the malicious executable runs, it could get the shell and run "mshta 'url of the hta'" . |
this is already on my to do list :) |
Hey,
Is it possible to add mshta based exploits? Generating html applications and running it with mshta shouldn't be a problem, I guess.
The text was updated successfully, but these errors were encountered: