phillips321.co.uk

pen testing, security and linux

  • Home
  • About Me
  • bt5-fixit.sh
  • GnackTrack
  • Metasploit Notes
  • pentest.sh

csc.exe

Use .NET csc.exe to create a malicious EXE on locked down systems

Published January 25, 2013 | By phillips321

First off, credit for this work goes to n3k @kiqueNissim and X_Typhon @lintuxt who produced an excellent paper here.

These notes are not to take anything away from the two mentioned above but are purely for my own reference (I find writing things up helps me to remember it), I strongly suggest reading the white paper as it goes into much more detail than I will here.

So on… Continue reading →

Posted in Uncategorized | Tagged c#, csc, csc.exe, DLL, exe, memory, optcode | 10 Comments
Follow @phillips321

Recent Posts

  • Automating an Active Directory Audit in PowerShell
  • CherryTree on MacOS (OSX)
  • IPv6 LocalLink to IPv4 scanning tool
  • NetKit IPv6 Test Lab
  • WiPiResponder = Pi Zero W + Responder
  • Recovering an activity from a Garmin 920 XT Forerunner
  • hashcat on OS X – getting it going!
  • PHP NMAP Scan Page
  • Hacking the ATN X-sight – part1
  • NFSShell on Kali Linux 2.0

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Links

  • 0entropy
  • BruteForce Lab's Blog
  • carnal 0wnage
  • DarkOperator
  • Extra
  • grm n00bs
  • Hack Whack and Smack
  • IronGeek
  • Night Slayer
  • pentest-n00b
  • PenTesticles
  • room362
  • ScriptMonkey

Please feel free to share my content but always link back here :-)