Skip to content

Commit

Permalink
Applying update b8e6d35
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 24, 2024
1 parent 9cc061d commit 2278285
Show file tree
Hide file tree
Showing 4 changed files with 53 additions and 0 deletions.
9 changes: 9 additions & 0 deletions _entries/microsoft/built-in/cryptbase.md
Original file line number Diff line number Diff line change
Expand Up @@ -223,17 +223,26 @@ VulnerableExecutables:
Type: Authenticode
SHA256:
- 6511ef24c41cf20f707119dd40971420f1cd6f97f0e888b7d24b5e0dec9d5495
- Path: '%PROGRAMFILES%\Microsoft Deployment Toolkit\Bin\Microsoft.BDD.Catalog35.exe'
Type: Sideloading
ExpectedSignatureInformation:
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Type: Catalog
Resources:
- https://wietze.github.io/blog/hijacking-dlls-in-windows
- https://securityintelligence.com/posts/windows-features-dll-sideloading/
- https://github.com/xforcered/WFH
- https://twitter.com/AndrewOliveau/status/1682185200862625792
- https://twitter.com/BSummerz/status/1860045985919205645
Acknowledgements:
- Name: Wietze
Twitter: '@wietze'
- Name: Chris Spehn
Twitter: '@ConsciousHacker'
- Name: Andrew Oliveau
Twitter: '@AndrewOliveau'
- Name: Will Summerhill
Twitter: '@BSummerz'
---

26 changes: 26 additions & 0 deletions _entries/microsoft/built-in/cryptnet.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
Name: cryptnet.dll
Author: Will Summerhill
Created: 2024-11-22
Vendor: Microsoft
ExpectedLocations:
- '%SYSTEM32%'
- '%SYSWOW64%'
ExpectedSignatureInformation:
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Type: Catalog
VulnerableExecutables:
- Path: '%PROGRAMFILES%\Microsoft Deployment Toolkit\Bin\Microsoft.BDD.Catalog35.exe'
Type: Sideloading
ExpectedSignatureInformation:
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Type: Catalog
Resources:
- https://twitter.com/BSummerz/status/1860045985919205645
Acknowledgements:
- Name: Will Summerhill
Twitter: '@BSummerz'
---

9 changes: 9 additions & 0 deletions _entries/microsoft/built-in/iphlpapi.md
Original file line number Diff line number Diff line change
Expand Up @@ -216,6 +216,12 @@ VulnerableExecutables:
Type: Authenticode
SHA256:
- 6511ef24c41cf20f707119dd40971420f1cd6f97f0e888b7d24b5e0dec9d5495
- Path: '%PROGRAMFILES%\Microsoft Deployment Toolkit\Bin\Microsoft.BDD.Catalog35.exe'
Type: Sideloading
ExpectedSignatureInformation:
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Type: Catalog
Resources:
- https://wietze.github.io/blog/hijacking-dlls-in-windows
- https://wietze.github.io/blog/save-the-environment-variables
Expand All @@ -224,6 +230,7 @@ Resources:
- https://github.com/xforcered/WFH
- https://twitter.com/AndrewOliveau/status/1682185200862625792
- https://x00.zip/playing-with-process-handles/
- https://twitter.com/BSummerz/status/1860045985919205645
Acknowledgements:
- Name: Wietze
Twitter: '@wietze'
Expand All @@ -235,5 +242,7 @@ Acknowledgements:
Twitter: '@AndrewOliveau'
- Name: Tim Peck
Twitter: '@B0bby_Tablez'
- Name: Will Summerhill
Twitter: '@BSummerz'
---

9 changes: 9 additions & 0 deletions _entries/microsoft/built-in/profapi.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,11 +75,20 @@ VulnerableExecutables:
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Type: Catalog
- Path: '%PROGRAMFILES%\Microsoft Deployment Toolkit\Bin\Microsoft.BDD.Catalog35.exe'
Type: Sideloading
ExpectedSignatureInformation:
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Type: Catalog
Resources:
- https://securityintelligence.com/posts/windows-features-dll-sideloading/
- https://github.com/xforcered/WFH
- https://twitter.com/BSummerz/status/1860045985919205645
Acknowledgements:
- Name: Chris Spehn
Twitter: '@ConsciousHacker'
- Name: Will Summerhill
Twitter: '@BSummerz'
---

0 comments on commit 2278285

Please sign in to comment.