Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update IE unsafe scripting module #2299

Merged
merged 2 commits into from Aug 31, 2013
Merged

Conversation

Meatballs1
Copy link
Contributor

This module removes the requirement for ADODB.Stream which is blocked by default even when unsafe scripting methods are allowed. Instead we just use the VBS to write the EXE for us (we use to create a VBS file anyway).

Have also added a technique to take advantage of Powershell to avoid dropping a file to the disk at all. Strangely even when IE is run in x64 mode, all tabs are x86 and WScript.Shell and Powershell are therefore SYSWOW64. We cant run x64 payloads in these Powershell instances but luckily this saves the user from having to guess (or recon) the correct architecture!

@wchen-r7
Copy link
Contributor

Note: Travis CI error doesn't look related to the module.

@wchen-r7 wchen-r7 merged commit a12f509 into rapid7:master Aug 31, 2013
@Meatballs1 Meatballs1 deleted the unsafe_scripting branch September 1, 2013 18:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants