Skip to content

Latest commit

 

History

History

Windows_RCE_as_a_Service

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Windows RCE as a Service

View on OWASP Global AppSec US 2022 agenda

Abstract

Windows 11 includes a handy feature called Power Automate Desktop, which lets users automate mundane tasks. In a nutshell, Users can build custom processes and hand them to Microsoft, which in turn ensures they are distributed to all user machines, executed successfully and reports back to the cloud. You can probably already see where this is going..

We will show how Power Automate Desktop can be repurposed to power malware operations. We will demonstrate the full cycle of distributing payloads, bypassing perimeter controls, executing them on victim machines and exfiltrating data. All while using nothing but Windows baked-in and signed executables, and Office cloud services.

We will then take you behind the scenes and explore how this service works and what attack surface it exposes on the machine and in the cloud. We will also point out a few promising future research directions for the community to pursue.

Finally, we will share an open-source command line tool to easily accomplish all of the above, so you will be able to add it into your Red Team arsenal and try out your own ideas.

Recommended pre-reading materials

Tools and Demos

Articles

Talk materials

  • Slides

  • The talk wasn't recoded, but you can find a recording of the same talk from BSides Singapore here