all InfoSec news
Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution
June 7, 2023, 8:11 p.m. | Nick Powers
Security Boulevard securityboulevard.com
The contents of this blogpost was written by Nick Powers (@zyn3rgy) and Steven Flores (@0xthirteen), and is a written version of the content presented at Defcon30.
With the barrier to entry for initial access ever increasing, we spent some time digging into potentially lesser-known weaponization options for ClickOnce deployments. A few of the hurdles we’d like to overcome by implementing these weaponization options include:
- Install / execute application without administrative privileges
- Reputable, known-good file(s) used …
access clickonce code code execution entry initial access nick options phishing research smartscreen version written
More from securityboulevard.com / Security Boulevard
Jobs in InfoSec / Cybersecurity
Sr. Product Manager
@ MixMode | Remote, US
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Analysis Senior Specialist
@ NTT DATA | singapore, 01, SG
Information Assurance Analyst - Security Architecture / Vulnerability Management
@ Hawaiian Electric | Honolulu, Hawaii (HI), US, 96840