0xShukruN
TwitterLinkedInGitHub
  • 0xShukruN /?
  • Blogs
    • 🔍Office Templates and GlobalDotName - A Stealthy Office Persistence Technique
  • Offensive Security
    • 🗃️Windows Components Object Model
      • 🔍Demystifying Windows Component Object Model (COM)
      • 🔍COM Hijacking - T1546.015
      • 📜COM Execution - T1559.001
  • Internals, Reversing
    • 🛠️Windows Exploit Mitigations
    • 🛠️Windows Kernel Drivers 101 - Creating a Simple Driver
  • Miscellaneous
    • 🗃️Code Execution Templates
      • 📜Downloaders and Shellcodes
      • 📜Win32 API Execution
    • 📜Frameworks Resources
    • 📜Linux Essentials
    • 📜Bash Scripting
Powered by GitBook
On this page
  • Known Techniques
  • COM Hijacking
  • COM Elevation of Privilege - UAC Bypass
  • Lateral Movement with DCOM
  • Code Execution
  • COM / DCOM reading material
  • Main Source
  • General COM Internals
  • COM Hijacking / Persistence
  • DCOM Lateral Movement
  • COM Privilege Escalation / UAC Bypasses

Was this helpful?

  1. Offensive Security

Windows Components Object Model

Windows Components Object Model is an old however widely used technology on Windows Systems. Its Attack surface is vast and can be utilized for various goals which I hope to cover in future articles.

PreviousOffice Templates and GlobalDotName - A Stealthy Office Persistence TechniqueNextDemystifying Windows Component Object Model (COM)

Last updated 2 years ago

Was this helpful?

Known Techniques

COM Hijacking

- Event Triggered Execution: Component Object Model Hijacking

Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

COM Elevation of Privilege - UAC Bypass

- Abuse Elevation Control Mechanism: Bypass User Account Control

Windows programs can elevate privileges or execute some elevated objects without prompting the user through the UAC notification box. An example of this is use of to load a specifically crafted DLL which loads an auto-elevated object and performs a file operation in a protected directory which would typically require elevated access.

Lateral Movement with DCOM

- Remote Services: Distributed Component Object Model

Adversaries may use to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user.

Code Execution

- Inter-Process Communication: Component Object Model

Adversaries may use various COM objects to achieve their goals, some of their goals can be, Arbitrary code execution, Creating Schedules Tasks, Modification of Registry or Files, etc.

COM / DCOM reading material

Main Source

General COM Internals

COM Hijacking / Persistence

DCOM Lateral Movement

COM Privilege Escalation / UAC Bypasses

🗃️
T1546.015
T1548.002
Component Object Model
Rundll32
Component Object Model
T1021.003
Valid Accounts
T1559.001
https://learn.microsoft.com/en-us/windows/win32/com/component-object-model--com--portal
🔍Demystifying Windows Component Object Model (COM)
🔍COM Hijacking - T1546.015
https://www.mandiant.com/resources/hunting-com-objects
https://www.mandiant.com/resources/hunting-com-objects-part-two
https://mohamed-fakroud.gitbook.io/red-teamings-dojo/windows-internals/playing-around-com-objects-part-1#conclusion
https://the-deniss.github.io/posts/2021/05/17/discovering-and-exploiting-mcafee-com-objects.html
https://www.tiraniddo.dev/2018/09/finding-interactive-user-com-objects_9.html?m=1
https://gist.github.com/peteristhegreat/0d2d2580bd3fd353b178c1c4da2e455e
https://www.codeguru.com/soap/step-by-step-com-tutorial/
https://troopers.de/downloads/troopers17/TR17_Demystifying_%20COM.pdf
https://pentestlab.blog/2020/05/20/persistence-com-hijacking/
https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Get-ScheduledTaskComHandler.ps1
https://pentestlab.blog/tag/scriptlet/
https://googleprojectzero.blogspot.com/2021/10/windows-exploitation-tricks-relaying.html
https://bohops.com/2018/06/28/abusing-com-registry-structure-clsid-localserver32-inprocserver32/
https://www.ime.usp.br/~reverbel/SOD-97/Textos/dcom_corba/Paper.html
https://www.cybereason.com/blog/dcom-lateral-movement-techniques
https://redblue42.code42.com/detecting-lateral-movement-via-dcom/
https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-2-dcom/
https://www.scorpiones.io/articles/lateral-movement-using-dcom-objects
https://blog.menasec.net/2019/02/threat-hunting-18-lateral-movement-via.html
https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
https://hackdefense.com/assets/downloads/automating-the-enumeration-of-possible-dcom-vulnerabilities-axel-boesenach-v1.0.pdf
https://klezvirus.github.io/RedTeaming/LateralMovement/LateralMovementDCOM/
https://conference.hitb.org/hitbsecconf2017ams/materials/D2T3%20-%20James%20Forshaw%20-%20Introduction%20to%20Logical%20Privilege%20Escalation%20on%20Windows.pdf
https://www.youtube.com/watch?v=q9dnYno_Moc
https://www.fuzzysecurity.com/tutorials/27.html
https://swapcontext.blogspot.com/2020/11/uac-bypasses-from-comautoapprovallist.html
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-1.html
https://cqureacademy.com/cqure-labs/cqlabs-how-uac-bypass-methods-really-work-by-adrian-denkiewicz
https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/