Infiltrator Posted June 5, 2010 Share Posted June 5, 2010 (edited) Hi All, I would like to know if that's possible for an .exe file to automatically execute itself upon arrival on a target machine without any user interaction. For example, I am running two VMs one of them is a web server that has some file uploading mechanism and the other machine is the attacker machine. Now when I upload an .exe file from the attacker machine to the victim machine (web server) I would like the .exe file to execute itself upon arrival if this is even possible at all? Your comments will be much appreciated thank you. Regards, Infiltrator Edited June 5, 2010 by Infiltrator Quote Link to comment Share on other sites More sharing options...
emaster28 Posted June 5, 2010 Share Posted June 5, 2010 Have u seen the section on the USB Switchblade or Hacksaw? If you have, then sorry, this reply is useless. Quote Link to comment Share on other sites More sharing options...
ChevronX Posted June 5, 2010 Share Posted June 5, 2010 Possibly some sort of packaged exe, with the /s switch. Silent installer or away to have an autorun file execute. Unsure, im sure others will have better ideas then I have. Quote Link to comment Share on other sites More sharing options...
will-wtf Posted June 6, 2010 Share Posted June 6, 2010 Self execution can only really be made with autorun (now mostly patched) or an exploit as self execution is the main component in malware... :S A while back there was a .GIF exploit that would cause this to happen :) Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted June 7, 2010 Author Share Posted June 7, 2010 (edited) Self execution can only really be made with autorun (now mostly patched) or an exploit as self execution is the main component in malware... :S A while back there was a .GIF exploit that would cause this to happen :) I guess I could do the following put a php/asp shell on the server and use that to execute your exe or use some sort of exploit script to do the dirty work for me. Edited June 7, 2010 by Infiltrator Quote Link to comment Share on other sites More sharing options...
redxine Posted June 7, 2010 Share Posted June 7, 2010 Ah - thus is entering the realm of buffer overflows. And that is quite a bit of an art. Looking at where a service has a memory leak and taking advantage of it to spill your code perfectly into the IP value of the next memory address, and having the processor run your code with it.... The only other thing I could think of is having it replace an already existing binary (such as one in cgi-bin [look for bad permissions]) and then calling it remotely with a request. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.