Windows Library Files
Windows Library Files are virtual containers used to connect users with data located in remote locations like web services or SMB shares.
Last updated
Windows Library Files are virtual containers used to connect users with data located in remote locations like web services or SMB shares.
Last updated
have a .Library-ms extensions and are executed by double clicking on them.
In order to share our malicious Windows Library file to the victim we will create a WebDAV share to host the staged payload.
We will create a new file on our Windows host and name it "dog.Library-ms".
Right now the icon is a little suspicious, let's change it to something else, like a photo.
We can test to see if it's working by double clicking our "dog" icon on the deskop.
We can see if the re-open "dog" that the code has been changed. This happens due to Windows trying to optimize the WebDAV communication with the client. So before we ship it off the the victim we have to make sure that we've fixed it and NOT OPENED it on our end.
Delete the serialized tag and fix the url tag with:
We will create a shortcut on the Desktop. This shortcut will download powercat and open a reverse shell. Add the following by: Right-Click Desktop and select New > Shortcut.
We will create a python web server to serve the powercat script.