Beyond good ol’ Run key, Part 154
文章介绍了Windows系统中一种基于Ghostscript软件套件的持久化机制。通过修改注册表中`(HKCU|HKLM)\Software\GPL Ghostscript\<version>\GS_DLL`条目指向恶意DLL文件,攻击者可实现持久化和恶意活动。此外,该机制还可通过环境变量进一步滥用。 2026-1-2 14:7:43 Author: www.hexacorn.com(查看原文) 阅读量:3 收藏

In this series I describe a lot of Windows persistence mechanisms. Most of them are ‘native’ to the OS, but I sometimes cover opportunities offered by popular software too. Today’s case is one of these.

Ghostscript is a superpopular:

suite of software based on an interpreter for Adobe Systems’ PostScript and Portable Document Format (PDF) page description languages

that can be found installed on many Windows endpoints today. It is often being installed as a dependent component supporting a lot of various applications, including PDF software, games, etc.

What we can find as particularly interesting from a persistence standpoint, is this Registry entry:

(HKCU|HKLM)\Software\GPL Ghostscript\<version>\GS_DLL=<DLL library>

Any software relying on Ghostscript will eventually refer to it, and load the DLL this entry points to. As such, it can be leveraged for persistence (proxy DLL).

This mechanism is described in detail here.

If you read the linked article, you will notice that there is an alternative way to set the value of GS_DLL by using the environmental variable. This feature can be abused for both persistence and lolbin activities.


文章来源: https://www.hexacorn.com/blog/2026/01/02/beyond-good-ol-run-key-part-154/
如有侵权请联系:admin#unsafe.sh