Backdoor Files
Last updated
Last updated
Legit binary can be replaced with reverse shell. can inject payload into a legit binary.
Changing shortcut target to our reverse shell
Point it to a script:
Shortcut target:
Registry stores key for every single file type under HKLM\Software\Classes
which contains the ProgID.
ProgID
is the identified for the program that opens that file.
Example:
HKLM\Software\Classes
also has entry for the txtfile
ProgID.
Default command to run for the files is stored under HKLM\Software\Classess\<progID>\shell\open\command
We can change this key to
backdoor2.ps1
Opening a txt file will now trigger the reverse shell