# MSI Shenanigans

## Intro

Samples in this directory constitute PoCes presenting different ways to make MSI installation subsystem execute:

- System commands
- EXE files
- .NET DLLs
- VBScript/JScript

## Samples Included

- `1-exe` - launches MS Sysinternals Autoruns64.exe from `C:\Windows\Installer\MSXXXX.msi`
- `2-vbscript` - executes VBScript that runs `calc` over `Wscript.Shell.Exec` method
- `3-dotnet` - bundles specially crafted CustomAction .NET DLL, that when executed, runs shellcode which spawns `calc`
- `4-post-actions` - simple MSI that runs system commands after installation is complete, here runs `calc`


## Copyrights

> 
> Copyright (C) Binary-Offensive.com Mariusz Banach - All Rights Reserved
> Unauthorized copying of this file, via any medium is strictly prohibited.
>
> This file/directory was part of Modern Initial Access and Evasion Tactics training
> delivered by binary-offensive.com and was provided as supplemental material.
> 
> Authored by Mariusz Banach <mb@binary-offensive.com>, @mariuszbit / mgeeky
> 
