This is small harness to recreate the social engineering and phishing lure recently seen in the wild around August/September 2024.
Originally seen with the guise “Verify you are human”, the attack vector being copy and paste.
It literally instructs the user to open the Windows Run dialog box with the hotkey Win+R
, and have them paste in a malicious command with Ctrl+V
that the web browser has premptively copied into their clipboard.
Really all you need is index.html
. It includes the CSS and JavaScript in a single file for ease of use, but might need further customization to change the command that is ran (see the JavaScript at the end of the showVerifyWindow
function).
This can be used as a standalone file and a run any local command, but to get a bit more flexibility with code execution, this repository includes a sample HTA file recaptcha-verify
for an innocent proof of concept of popping open the Windows calculator application.
This secondary HTA file would mean it needs to be hosted server-side, or have some other backing infrastructure to offer the payload.
For quick local testing, I literally just used python -m http.server 8000
.
The HTA file also gives you an opportunity for more convincing charade, too, potentially with a window that pops up to “try and connect to the reCAPTCHA servers”, but state that it fails and prompt the user to do it all over again. 🤪 (Extra callbacks, anybody?)
So this recreation has some extra perks:
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…