Skip to content

Leverages the built-in assoc command and a public powershell file handler script to map file types to handler on Windows

Notifications You must be signed in to change notification settings

sec-tools/WindowsFileHandlerEnumeration

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WindowsFileHandlerEnumeration

Leverages the built-in assoc command and a public powershell file handler script to map file types to handler on Windows

Purpose

If you're looking for targets to hunt for security vulnerabilities, eg. fuzzing then this is script can do the basics for enumerating attack surface by producing a mapping of which applications have default associations with which file types. Credit for original code goes to the folks on Stackoverflow. This was a quick modification to serve a purpose and figure out what's interesting in the way of Windows file handlers and third party file associations.

Usage

C:\> assoc > assoc.txt

(then replace =.* with nothing to create a .ext file or modify the script to do this stuff)

C:\> .\AssocQueryString.ps1
...
.hlp :: C:\Windows\winhlp32.exe
.hta :: C:\Windows\SysWOW64\mshta.exe
.htm :: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
.html :: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
.icc :: C:\Windows\system32\colorcpl.exe
.icm :: C:\Windows\system32\colorcpl.exe
.imesx :: C:\Windows\system32\IME\SHARED\imesearch.exe
.img :: C:\Windows\Explorer.exe
.inf :: C:\Windows\system32\NOTEPAD.EXE
.ini :: C:\Windows\system32\NOTEPAD.EXE
.iso :: C:\Windows\Explorer.exe

About

Leverages the built-in assoc command and a public powershell file handler script to map file types to handler on Windows

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published