Common Information
Type Value
Value
JavaScript - T1059.007
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may abuse various implementations of JavaScript for execution. JavaScript (JS) is a platform-independent scripting language (compiled just-in-time at runtime) commonly associated with scripts in webpages, though JS can be executed in runtime environments outside the browser.(Citation: NodeJS) JScript is the Microsoft implementation of the same scripting standard. JScript is interpreted via the Windows Script engine and thus integrated with many components of Windows such as the [Component Object Model](https://attack.mitre.org/techniques/T1559/001) and Internet Explorer HTML Application (HTA) pages.(Citation: JScrip May 2018)(Citation: Microsoft JScript 2007)(Citation: Microsoft Windows Scripts) JavaScript for Automation (JXA) is a macOS scripting language based on JavaScript, included as part of Apple’s Open Scripting Architecture (OSA), that was introduced in OSX 10.10. Apple’s OSA provides scripting capabilities to control applications, interface with the operating system, and bridge access into the rest of Apple’s internal APIs. As of OSX 10.10, OSA only supports two languages, JXA and [AppleScript](https://attack.mitre.org/techniques/T1059/002). Scripts can be executed via the command line utility <code>osascript</code>, they can be compiled into applications or script files via <code>osacompile</code>, and they can be compiled and executed in memory of other programs by leveraging the OSAKit Framework.(Citation: Apple About Mac Scripting 2016)(Citation: SpecterOps JXA 2020)(Citation: SentinelOne macOS Red Team)(Citation: Red Canary Silver Sparrow Feb2021)(Citation: MDSec macOS JXA and VSCode) Adversaries may abuse various implementations of JavaScript to execute various behaviors. Common uses include hosting malicious scripts on websites as part of a [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) or downloading and executing these script files as secondary payloads. Since these payloads are text-based, it is also very common for adversaries to obfuscate their content as part of [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027).
Details Published Attributes CTI Title
Details Website 2050-08-03 29 Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com
Details Website 2044-04-01 13 Attackers Repurposing existing Python-based Malware for Distribution on NPM
Details Website 2024-11-17 0 Phishing emails increasingly use SVG attachments to evade detection
Details Website 2024-11-17 3 4T$-CTF Writeup — “Stirling”
Details Website 2024-11-17 8 “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”…
Details Website 2024-11-17 2 Hacking Into Pizza Paradise: A CTF Journey to the Flag
Details Website 2024-11-17 0 SQL Injection vs. Cross-Site Scripting (XSS): Know the Difference!
Details Website 2024-11-17 2 Phishing emails increasingly use SVG attachments to evade detection
Details Website 2024-11-16 2 Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge
Details Website 2024-11-16 18 Look This !
Details Website 2024-11-16 18 Browser’s Secret Diary: Memory Dumps Unveiled
Details Website 2024-11-16 10 How Did I Get My First Collaboration Bounty Of $1000?
Details Website 2024-11-16 0 Boost Your Cybersecurity Career With These 7 Hands-on Projects
Details Website 2024-11-16 25 How I Turned a Low Blind SSRF Into a Critical Vulnerability With Strategic Impact Escalation
Details Website 2024-11-16 4 Account takover of an online casino
Details Website 2024-11-16 0 Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking
Details Website 2024-11-16 25 BugBounty — Mastering the Basics (along with Resources)[Part-4]
Details Website 2024-11-16 2 Nextjs Certification?
Details Website 2024-11-16 1 The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery
Details Website 2024-11-16 0 Introduction to Dharma - Part 1 — Haboob
Details Website 2024-11-15 0 Web Siteleri ve platform Neden IP Adreslerini Kaydederler ?
Details Website 2024-11-15 2 ハッカー、macOSの拡張ファイル属性を使って悪意のあるコードを隠す - PRSOL:CC
Details Website 2024-11-15 18 Browser’s Secret Diary: Memory Dumps Unveiled
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 11 Phishing Sitelerinin Anatomisi