Initial access taxonomy: DELIVERY(CONTAINER(TRIGGER + PAYLOAD + DECOY))

Payloads - DLL Side-loading

The Windows Component Store is located in C:\\Windows\\WinSxS. It is responsible for maintaining older versions of software that have been updated/patched. If a current program version isn’t vulnerable anymore e.g. to DLL Hijacking, you may find it in C:\\Windows\\WinSxS and run if from there.

Example

Current version of ngentask.exe, not vulnerable to DLL hijacking:

image.png

ngentask.exe version stored in C:\\Windows\\WinSxS\\amd64_netfx4-ngentask_exe_b03f5f7f11d50a3a_4.0.15805.0_none_d4039dd5692796db\\ngentask.exe that is vulnerable to DLL hijacking

image.png

Payloads - AppDomainManager

Payloads - MSI

Windows installers aka MSI are files that store files and necessary steps to install an application. They can act as containers in the initial access taxonomy.

Payloads - Excel Add-in’s

Payloads - Code Signing

This is where the controversies creep in. If it's not feasible to buy a certificate as your company, what else can you do? One possibility is to set up and maintain dummy/shell companies, which takes a lot of time and effort. Another is to use leaked and/or stolen certificates, which is much quicker and easier. For instance, GitHub has a path qualifier that can be used to find certificates that have been committed to public repositories. You may also search public S3 buckets, game hacking forums, and other places.

Containers