Jump to content
OpenSecurity.global
  • Recently Browsing   0 members

    No registered users viewing this page.

Sign in to follow this  
Jonny Schnittger

Recently blogged on persistence using Slack, feedback/thoughts appreciated

Recommended Posts

I recently blogged about gaining persistence and remote execution using the Slack client (local file injection). It's my first blog post in years and I'd appreciate any feedback or thoughts on it. 
Any and all feedback appreciated.

https://medium.com/@JonnySchnittger/achieving-persistence-in-slack-through-local-file-injection-d1a54386f4f4

 

  • Like 1
  • Thanks 1

Share this post


Link to post

The don't load files from disk anymore, you could still unpack the .asar file, modify and repack it... which is very easy to do... you still need local access. I wrote this for our red team to use on a campaign at some point. It's something that a lot of electron apps do, and they're all susceptible to asar modification. The problem of shipping your source with your product.

I was also looking at embedding JavaScript inside the external .svg files the have on disk, but I couldn't find them actually being loaded.

They specifically state local access is out of scope for their bug bounty, so it's something they've known about for awhile I would say.

Share this post


Link to post

Oh that's interesting.  I think it's still a fun thing to do, regardless of scope.  Good info.

Share this post


Link to post

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

  • Members online now

    No members to show

×
×
  • Create New...

Important Information

We use cookies as we're cookie monsters. Privacy Policy