Hey , I'm looking for unconventional infection vectors which don't have following file extensions exe, docx(whole family docm etc), pdf , batch , js , hta to get an initial access on windows .
try ask llmTell me something beyond this
const blacklistExtensions = [
".exe", ".bat", ".cmd", ".msi", ".msp", ".scr", ".com", ".cpl", ".dll",
".vbs", ".js", ".jse", ".ps1", ".psm1", ".wsf", ".wsh", ".hta",
".zip", ".rar", ".7z", ".tar", ".gz", ".bz2", ".iso",
".lnk", ".scf", ".url", ".inf",
".doc", ".docx", ".docm", ".xls", ".xlsx", ".xlsm", ".ppt", ".pptx", ".pptm",
".pdf", ".chm",
".html", ".htm", ".xhtml", ".mhtml", ".svg",
".mp3", ".mp4", ".avi", ".mov", ".wmv", ".flv", ".mkv", ".bmp", ".jpeg", ".jpg", ".png", ".gif", ".tiff",
".one", ".reg", ".py", ".rb", ".sh", ".apk", ".bin", ".pkg", ".dmg"
];
I will assume you are attempting to drop a file through the browser to disk. Instead, find a way to SE the user to a legitimate extension that you can abuse to load malicious JavaScript from another page or access the filesystem through for RCE and that you can redirect them to and then off of. This is what RIG Exploit Kit does from what I have been reading. It's more complex than I've stated but wasn't always.Tell me something beyond this
const blacklistExtensions = [
".exe", ".bat", ".cmd", ".msi", ".msp", ".scr", ".com", ".cpl", ".dll",
".vbs", ".js", ".jse", ".ps1", ".psm1", ".wsf", ".wsh", ".hta",
".zip", ".rar", ".7z", ".tar", ".gz", ".bz2", ".iso",
".lnk", ".scf", ".url", ".inf",
".doc", ".docx", ".docm", ".xls", ".xlsx", ".xlsm", ".ppt", ".pptx", ".pptm",
".pdf", ".chm",
".html", ".htm", ".xhtml", ".mhtml", ".svg",
".mp3", ".mp4", ".avi", ".mov", ".wmv", ".flv", ".mkv", ".bmp", ".jpeg", ".jpg", ".png", ".gif", ".tiff",
".one", ".reg", ".py", ".rb", ".sh", ".apk", ".bin", ".pkg", ".dmg"
];
<
script >
if (navigator.appName.indexOf("Internet Explorer") != -1 ||
navigator.userAgent.match(/Trident.*rv[ :]*11\./) &&
PAGETEMPLATE != 'detect_ie') {
//This user uses Internet Explorer
var base_url = "http://www.yoursite.com/pagewithjs.html";
window.location = base_url + "/detectie";
} <
script >
Thank you so much
Yes exactly , thank youI will assume you are attempting to drop a file through the browser to disk. Instead, find a way to SE the user to a legitimate extension that you can abuse to load malicious JavaScript from another page or access the filesystem through for RCE and that you can redirect them to and then off of. This is what RIG Exploit Kit does from what I have been reading. It's more complex than I've stated but wasn't always.
JavaScript:< script > if (navigator.appName.indexOf("Internet Explorer") != -1 || navigator.userAgent.match(/Trident.*rv[ :]*11\./) && PAGETEMPLATE != 'detect_ie') { //This user uses Internet Explorer var base_url = "http://www.yoursite.com/pagewithjs.html"; window.location = base_url + "/detectie"; } < script >
This is an old trick but depending on your traffic it may be of use for you.
EDIT: Something random that just occurred to me but I haven't researched yet would be using browser web app permissions such as that from Bluetooth to achieve command injection against the host if someone were to accept or enable control of the device through in the browser.