Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HTA stager #34

Open
RealHarshThakur opened this issue Jan 6, 2019 · 8 comments
Open

HTA stager #34

RealHarshThakur opened this issue Jan 6, 2019 · 8 comments
Labels
enhancement New feature or request

Comments

@RealHarshThakur
Copy link

Hey,
Is it possible to add mshta based exploits? Generating html applications and running it with mshta shouldn't be a problem, I guess.

@RayofLightz
Copy link

What do you mean, like a payload that calls back to mshta.exe or a stagger that uses mshta.exe to get the agent on to the system?

@RealHarshThakur
Copy link
Author

Stager to get the agent.

@RayofLightz
Copy link

So in one of the scripts you can use ActiveXObject to call cmd and call code. It is not the most clean solution but maybe you could grab and execute a msbuild stagger using a hta.

@RealHarshThakur
Copy link
Author

Can you specify which script you're talking about?

@RealHarshThakur
Copy link
Author

RealHarshThakur commented Jan 13, 2019

Using ActiveXObject , do you mean by creating wscript.shell object ?
Won't that require the site to be in Trusted sites?

@RayofLightz
Copy link

You are talking about an hta correct. Htas are html applications. They live on local disk and are run inside of an stripped down IE window. The code that gets run is using ActiveXObject. The scripting languages can be either visualbasic or javascript. The issues is that ActiveXObject is limited to COM objects. Using wscript.shell is the only way I can think of being able to create a stagger. Even though it would basically fall back onto another staging method. Unless there is a COM object that can be used to compile c# ?

@RealHarshThakur
Copy link
Author

RealHarshThakur commented Jan 14, 2019

I think this could be done: when the malicious executable runs, it could get the shell and run "mshta 'url of the hta'" .

@byt3bl33d3r
Copy link
Owner

this is already on my to do list :)

@byt3bl33d3r byt3bl33d3r changed the title Feature HTA stager Feb 9, 2019
@byt3bl33d3r byt3bl33d3r added the enhancement New feature or request label Feb 9, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants