1
0
Fork 0
mirror of https://github.com/berlinlee-phoenix/malicious-dev synced 2024-07-19 20:18:42 +00:00
Cyber Warfare & Defenses Research & Development
Find a file
berlinlee-phoenix f2be0e1291
Update README.md
2024-05-15 22:59:41 +08:00
advanced-Backdoor README.md 2024-03-01 21:38:49 +08:00
Arp-spoofer 5.4 Mar 2024 2024-03-05 10:06:43 +08:00
Basic-Backdoor 10 Mar 2024 2024-03-10 21:08:13 +08:00
BGP-DoS Adding all Licenses 2024-02-25 16:08:14 +08:00
Brute-force Update fire-superiority-hydra.sh 2024-02-26 17:36:27 +08:00
Buffer-overflow 5.4 Mar 2024 2024-03-05 10:06:43 +08:00
Bypass-Firewall-SSH-Tunneling README.md 2024-02-11 16:09:17 +08:00
Creative recon Backdoor engineering in progress 2024-01-31 21:38:43 +08:00
DHCP-DoS Adding all Licenses 2024-02-25 16:08:14 +08:00
E-books E-books added 2024-02-13 18:39:44 +08:00
Github-limit-bypass Github 50MB limit bypass 2024-02-29 10:25:50 +08:00
GNS Hardening SSH 2024-02-26 09:58:17 +08:00
Harden-SSH Hardening SSH 2024-02-26 09:56:49 +08:00
images 28-Apr-2024 update for fun :D 2024-04-28 09:09:58 +08:00
IPv6-illustrated Kali-vscode 2024-02-29 10:21:51 +08:00
Kali-Rebuild-Auto Add files via upload 2024-02-28 09:53:01 +08:00
Kali-VSCode more 2024-03-03 02:06:27 +08:00
Kasm OK 2024-03-03 01:16:16 +08:00
Kasm-K6 kasm-registry, OCR 2024-02-21 16:14:33 +08:00
Layer3-Firewall Hardening SSH 2024-02-26 09:58:17 +08:00
Linux-administration updating 2024-02-29 10:02:29 +08:00
MAC-changer mac-changer.sh 2024-02-19 20:02:05 +08:00
Multi-processing 4 Mar 2024 2024-03-04 18:03:58 +08:00
OCR kasm-registry, OCR 2024-02-21 16:14:33 +08:00
P2P p2p 2024-02-22 09:48:55 +08:00
Password-cracking adding Password-crack-sha512 2024-02-05 15:10:33 +08:00
Password-hash 28-Apr-2024 update for fun :D 2024-04-28 09:09:58 +08:00
PHP-backdoors@b15017f9c5 PHP Backdoors from github added 2024-02-17 00:54:18 +08:00
Port-scanner 28-Apr-2024 update for fun :D 2024-04-28 09:09:58 +08:00
Pranks Backdoor engineering in progress 2024-01-31 21:38:43 +08:00
Python-modules 16.3 Mar 2024 2024-03-16 12:41:22 +08:00
Ransomware Delete Ransomware/build/exe.win-amd64-3.11 directory 2024-03-10 21:14:39 +08:00
STP-attack BGP Denial of Service explained 2024-02-13 14:14:17 +08:00
Sync-flooder Fine-tuning 16 Mar 2024 2024-03-16 22:53:35 +08:00
TrollJan update dependencies 2024-01-31 22:03:03 +08:00
webshell@6ea3d75579 PHP Backdoors from github added 2024-02-17 00:54:18 +08:00
archive-key.asc 6-May-2024 2024-05-06 18:30:18 +08:00
DISCLAIMER.md DISCLAIMER.md 2024-02-25 16:23:41 +08:00
Dockerfile 6-May-2024 2024-05-06 18:30:18 +08:00
install.sh README.md 2024-02-19 15:11:27 +08:00
kali-tools.sh 6-May-2024 2024-05-06 18:30:18 +08:00
LICENSE.md Update LICENSE.md 2024-03-14 01:02:57 +08:00
README.md Update README.md 2024-05-15 22:59:41 +08:00
witch.jpg Backdoor-verB can now download/upload files of whatever extensions :D 2024-02-12 18:42:24 +08:00

Penetration Testing

Radio silence: This repo has been archived and no longer updates ;)

[Cyber Warfare & Defenses Research & Development]


Ethical Hacking
hero
explosion
explosion2
avada-kedavra

Let's Rock ;)


atomic blonde
atomic blonde2

Disclaimer

Best way to learn something as complex as Ethical Hacking

Is to teach others how to hack ;)


Learning Ethical Hacking does NOT necessarily mean that I have to become a Professional Ethical Hacker ;)

Knowledge is FREE, we do NOT forgive, we do NOT forget

WE ARE ANONYMOUS :D


What you do define Who you are ;)

If you do think you can stop me from learning hacking, let's see ;)


Besides, Professor Turin created what we use everyday :D


This repository does NOT cover OSCP syllabus at all

Please do NOT compare our technical level against OSCP

OSCP = Civil class Penetration Testing

This repo = National class Cyber Warfare


Best option to-date to protect ourselves from Cyber attacks = Do not use a computer/mobile phone ;)


This repository does NOT encourage any forms of Malicious Activities OR Unethical Hacking against any person(s)/Group(s)/Insitution(s) or Government(s)


This repository is a medium of collaboratively public Learning, Research & Development on how to protect ourselves from modern Cyber Warfare.


Most importantly, we still do NOT have any practical approaches against fileless hacking discussed & explained herewith.

Recommended Networking Knowledge


1. Either TCP/IP Illustrated/CCNP

TCP/IP Illustrated vol.1

TCP/IP Illustrated vol.1

http://www.r-5.org/files/books/computers/internals/net/Richard_Stevens-TCP-IP_Illustrated-EN.pdf


TCP/IP Illustrated vol.2 - The Implementation

TCP/IP Illustrated Vol.2

https://www.redbooks.ibm.com/redbooks/pdfs/sg247897.pdf


TCP/IP Illustrated vol.3 - Sockets, API & Protocol Suite

TCP/IP Illustrated Vol.3

https://doc.lagout.org/network/TCP-IP%20Illustrated%20Vol.3.pdf


OR


CCNP (Costly & NOT mandatory)

CCNP

Do NOT go for the Cert, go for the knowledge in it is more than enough :D


2. Recommended Network programming:

Some RFC concepts


Python Scapy for Rapid prototyping


Some Violent Python

(Entry level): OOP, Python, Bash, HTTP, Socket, TCP/IP


FREE knowledge

https://repo.zenk-security.com/Programmation/Violent%20Python%20-%20A%20Cookbook%20for%20Hackers,%20Forensic%20Analysts,%20Penetration%20Testers%20and%20Security%20Enginners.pdf


The Purposes of this repo

To demonstrate IGS also has alternative Cybersecurity :D


Contributors of 1st PoC:

IGS

IGS Cybersecurity ( & Network) team, IGS Fullstack Dev team, IGS SRE team, IGS DevSecOps team, IGS Infra team, IGS Network team, IGS Cybersecurity Blue Team, IGS Cybersecurity Red Team, Anonymous Developers behind the scenes


I have formal permissions and associated priviledges to launch these attacks on the Web Application Firewall products provided by other IT vendor company during a Proof of Concepts process


If you're also undertaking such obligations to test a Web App Firewall, please enjoy the learning process! :D

Cuz this experience is invaluable :D


A Web Application Firewall looks like:

Web App Firewall

This repo is documented for learning & professional development purposes


If you do NOT follow rules below, YOU absolutely GO TO JAIL ;)

Jail

Rule 0:

Set up your own lab as your hacking ground, do NOT perform any hacking on the Internet


Rule 1:

Ask your victims for permissions before doing any of these


Rule 2:

Do NOT launch any of these without permissions


Rule 3:

Please ONLY run these scripts on your victims, NOT your good selves...


Part 0 - Protections

If you're really challenging some Authoritativeness using your hacking skills, well good luck out there ;)


Self-protections techniques might save your life ;)


V getting shot at

Proxychains

This will change your Public IP using a number of proxy servers

proxychains proxychains-outputs

Tutorial

https://www.youtube.com/watch?v=KWwOU1z5E8E&t=657s


TOR

TOR

Tutorial

https://www.youtube.com/watch?v=6vg5JlQhHgo


Part 1 - Our Full-fleged Attacks platform(s)

Leveraging DevSecOps team's Might for Fire-superiority :D

air-fortress

Let's rock :D


i. Ansible Tower

Ansible Tower

Purposes of Ansible Tower:

death star death star

Attack Tools configuration automation

Attack Tools automated integration

Leveraging Full Fire-power of individual Kali VM through Bash Scripts

Ansible Tower = our Botnet Death Star


ii. Terraform

terraform

Purposes of Terraform

Rumbling

High speed Hacking playground formation in a private network

National class of Cyber Warfare Fire-superiority through Automated deployments of large numbers (thousands) of Kali VM using ISO images :D

Automated Kali VM Repository updates upon spawning :D

Automated Clustering of Victims' Web Apps Systems :D

Automated Load Balancing configuration of Victims' Systems :D

Automated deployment of Core Infrastructure e.g. DHCP, DNS, SSL cert registration of our Hacking playground :D


iii. Kasm

Kasm

Purposes of Kasm:

Reduces Disk usage, CPU, RAM constraints :D

Each standalone Kali VM serves as a single Turret :D

Each Kasm platform holds 5-6 Kali containers :D

Container streaming Desktop as a Service


User guide

https://www.youtube.com/watch?v=EJ5TYZLvJ70

https://www.youtube.com/watch?v=U5-oNbNEJYI


This is our Tertiary DDoS platform to launch multiple Docker Kali Linux


iv. Docker Compose

If you prefer writing your own .yml :D


docker-compose

With Ansible + Terraform + Kasm + Docker-compose, we have our absolute Fire-superiority :D


explosion

Usage

I'm a lazy guy, I use bypass...

I do NOT wanna write any .yml ;)

lazy

Fixing Kasm official open-source bugs...

Kasm official download .tar.gz has an official bug in ./install.sh

You MUST use ./Kasm/install-kasm.sh to get Kasm installed properly...



Part 2 - Introducing the components of our powerful Cyber Arms :D


1. Kali Linux

https://www.kali.org/

Kali Linux

Purpose of Kali Linux:

Offensive Security Open-source software

Recon, Cracking, SSL Stripping, Network Sniffing, Hacking IoT, Hacking everything with connections, Hacking the entire UDP + TCP/IP stacks etc.)



Upon fresh installation of an ISO image on VMware

You need to update && upgrade Kali repository


Step 1 Update expired Kali keys on base-build image

sudo wget https://archive.kali.org/archive-key.asc -O /etc/apt/trusted.gpg.d/kali-archive-keyring.asc;


Step 2 Update Kali.org Repository to start using HTTPS

sudo vim /etc/apt/sources.list;

Add these lines:

deb https://http.kali.org/kali kali-rolling main non-free contrib

deb-src https://http.kali.org/kali kali-rolling main non-free contrib

:wq

APT update & upgrade

sudo apt update && apt -y upgrade;


Step 4 Clean up APT after updating & upgrading to Kali repo

sudo apt autoremove -y;


To automate Kali repository & Install Attack tools

https://github.com/berlinlee-phoenix/Kali-Rebuild-Auto


There're NO boundaries between Networking & Development :D


We're gonnna be good at both ;)


If you have a Networking background

Download => Virtual Machines

Select your Virtualization environment

VMware / VirtualBox / Hyper-V


Get ISO images

https://www.kali.org/get-kali/#kali-installer-images


Being a Netrunner is like

V for Vendetta my-turn

If you have a Programming background


Get Containers (Docker/LXC/LXD)

Containers

https://www.kali.org/get-kali/#kali-containers

apt update && apt -y install kali-linux-headless

apt update && apt -y install kali-linux-large

docker pull kalilinux/kali-rolling

Being a Developer is like:

V x Shakespeare

How many people actually comprehend what a Developer says? I doubt...


Dumbledor

If you have both Networking & Programming background...

OMG! You ARE GONNA go on a RAMPAGE!! :D

Luke gor Luke gor Luke gor

2. The Kings of DDoS (top 3)

i. JMeter (dockerized)

https://github.com/alpine-docker/jmeter

https://github.com/justb4/docker-jmeter


ii. HPing3 (dockerized)

https://github.com/utkudarilmaz/docker-hping3


iii. Hydra


3. wireShark

wireShark wireShark2 wireShark3

Purposes of wireShark:

To capture all network traffic once you launch any attacks


wireShark = Capstone to allow us further engineer our Fire-superiority & exceed our Cyber Arms' limitations everyday :D


We can capture network traffic as .pcapng files & use USArmy Dshell to decode the captured traffic using a variety of dshell decoders :D

US Army Dshell project:

https://github.com/USArmyResearchLab/Dshell


See ./Dshell/Dshell guide.docx for user guide :D


Everyone can be Alan Turing :D

Alan Turin

Alan Turing

https://www.youtube.com/watch?v=owSoB4s9el8


If wireShark is used maliciously

wireShark comes in extremely handy upon our Man-in-the-middle attacks (Bettercap/Ettercap) :D

The tutorial for man-in-the-middle

https://www.youtube.com/watch?v=CW0Mf9qGBOc&t=154s


All of our ARP spoofed/poisoned Victims' network connections are totally exposed to us as Black Hats :D

We know what every victim is doing, browsing, their insecure logins (without TLSv1.2) for websites + SMTP servers + SQL by following their TCP/HTTP Streams :D

wireShark is just one of the best Cyber Arms ever :D


Using wireShark for good

Good guys also use Ettercap to do man-in-the-middle for spoofing suspicious targets to allow tracing of bad guys ;)

Arp poisoned suspicious targets => wireShark => choose a NIC => filter: ip.addr == pok guys' IP => follow TCP streams

i. Tracing Backdoor Server + Backdoor Client connections

ii. Arp spoofing attacks indicated by duplicated MAC address for the same IP in use

iii. Broadcast Address attacks (Arp + DHCP spoofing) detections

iv. ICMPv4 Flood detection

v. TCP SYN ACK Flood detection


3. Bash scripts

Bash

Purpose of Bash: Automation, configuration management, Multiplexing

Purpose of Bash: Ansible Artifactory bypass, Automated SSH Tunnelling through remote port forwarding to bypass firewall & Opening closed ports on victims machines ;)


For instance, we wanna do some Brute-forcing

Use Bash scripts in ./Brute-force

Install apt dependencies

chmod +x ./install.sh && bash install.sh;

4. Powershell Fileless hacking techniques

Purpose of PowerShell: 19 Microsoft Defender bypass, all layers Firewall bypass, Memory Dump, Windows Registry Dump

Purpose of PowerShell: PowerShell Execution Policy bypass, PS-Remoting bypass

Purpose of PowerShell: Ansible Artifactory code-screening bypass, , Building Botnets ;)

Purpose of PowerShell: SSH tunnelling through remote port forwarding, Malicious VPN connection, bring havoc on all Windows Users :D

Purpose of PowerShell: Automated SSH Tunnelling through remote port forwarding to bypass firewall & Opening closed ports on victims machines ;)

Purpose of PowerShell: Powerful Combined Arms with Metasploit & Bash for Cross-platform hacking ;)

Purpose of PowerShell Empire: Post exploitations for gaining a foothold on your victims

Launching all these crazy stuff using PowerShell Fileless hacking techniques remotely on your victims :D

PS Fileless Malware PS Fileless Hacking1 PS Fileless Hacking2 Fileless Hacking3

PowerShell Fileless Attacks

It allows you to put over a bunch of Malware using MC bypass leveraging memory execution without leaving any tracks behind on a Windows OS

Bullseye to hack modern Windows based OS when combined with cmd.exe / .bat to leverage powershell.exe -windowStyle hidden -command "powerShellLine1; powerShellLine2;"

Intro - PowerShell Fileless Malware

https://www.youtube.com/watch?v=RFGlilkI1Qg

Intro - PowerShell + VBA Fileless Malware

https://www.youtube.com/watch?v=-hhgiTP_fXQ

Short talks - PowerShell Fileless Malware

https://www.youtube.com/watch?v=BO0bVFZJmpg

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcT32ZiEWb2f9eMbpVjCX9Wd-uvMSWyK-snHWn1pQbKsyZiV-JiGn-dmnc73BpXqlJ0v3C0&usqp=CAU

https://www.youtube.com/watch?v=BFVzmZXIbQk

Long Tutorial - PowerShell Fileless Malware

https://www.youtube.com/watch?v=ChokX9P5tjM

Fileless hacking through encrypted SSH Tunnels to encrypt all traffic happened in port 22 as if normal port 443 HTTPS traffic

Sending all payloads via encrypted SSH tunnels using similar techniques as PowerShell

*** Sneaky Combined Arms ***

./advanced-Backdoor launched in a SSH tunnel

No one on Earth (Intrusion Detection Systems) can trace the network traffic happen between your Backdoor Server & victims' Backdoor Client happens within a SSH tunnel, especially traffic derived from downloading/uploading large numbers of files from/to Victims are perceived as normal HTTPS traffic ;)

SSH Tunneling

5. Python

Python Malware

Bullseye for hacking modern Linux based systems especially those web servers allowing users to upload files without regexp validations ;)

Since 202x, Python3.4 to Python3.9 are inbuilt runtime for many Linux based OS e.g. CentOS stream9, Debian 12, RedHat Linux etc.

Leveraging all built-in runtime e.g. PowerShell + Python + Bash gives you essentially extra 3 attack surfaces as combined-arm edges :D

Purpose of general Python: Rapid Prototyping for Security PoC, Automation scripting, Socket programming

Usage

Install Python Dependencies

bash ./Malware-Dev/install-modules.sh

6. Python Forensics - The Scapy module

Purpose of Scapy: Network sniffing, Network Automation, Network analysis

Python Scapy

As Python3.4 to Python3.9 runtime are very common on modern Linux OS

Installing python3-pip is NOT suspicious at all :D

Installation of Python3 Scapy

Windows:

python -m pip install scapy --user IGS

Linux:

sudo pip install scapy;

Tutorials

https://www.youtube.com/watch?v=YKxKnVE5FaE&list=PLhfrWIlLOoKOc3z424rgsej5P5AP8yNKR

7. Python multi-processing module

Purpose of multiprocessing: Slightly enhance Python slow performance...Not so useful...

Python Multi-processing Python Multi-processing

This serves as another Multiplexer to run your malicious scripts in parallel processes (asynchronous processes) to overcome Python very slow performance...

Multi-processing != Multi-threaded

8. Python multi-processing

https://www.youtube.com/watch?v=fKl2JW_qrso&list=PLdbtMgV1x_BiBTh_JwYpzramnhzOLgXvx&pp=gAQBiAQB

If you're looking forward to further enhance the DDoS firepower =>

Try Golang :D

Golang

gopacket module :D

Black Hat Go

https://github.com/google/gopacket

If you're really a crazy Red Team developer like me with a thirst of absolute fire-superiority to DDoS your targets :O

Oh No Avada Vedavra Explosion My Railgun

Try Rust - the Crab for concurrent programming :D

Rust

We have a real prototypal Rust program in ./Port-scanner/Rust/

https://www.youtube.com/watch?v=LDU_Txk06tM

To edit Rust code ./Port-scanner/Rust/src/main.rs

Re-compiling after editing code:

rustc ./Port-scanner/Rust/src/main.rs;

To run the Rust Port-scanner program

cargo run -- -j thread IP_ADDR;

I normally use -j 10000 threads for Port scanning ;)

9. Using Kali built-in powerful Attack Tools made of C, Perl, Ruby, Golang, and Python programming langauges :D

kali-tools

Kali Tools

Writing some very simple Bash + Kali Tools give you extra edges :D

Brute-forcing with Hydra

Hydra

Hands-on example

cd ./Brute-force

Edit hydra.sh OR 1n3sniper.sh

Edit the namelists & wordlists used for hydra

Edit the namelists & wordlists used for 1N3/Sn1per

10. Tmux

Purpose of TMUX: Terminal Multiplexing

A Multiplexer allows you to run your Bash scripts using 100+ terminals at the same time, when performing DoS using a single Kali VM/Kali Docker :D

TMUX

Multiplexer = A Mux serves as a layer of Amplifier to condense your fire-power

TMUX = A Mux to multiplex your single Brute-forcing script into 100+ terminals of concurrent bash sessions to run the single Bash script :D

Multiplexer

11. Open-source Namelists & Wordlists for Brute-forcing

Download custom Namelists & Wordlists from github.com

https://gist.github.com/DaveYesland/e1d42489334049daf59d1c26543faa8b

Performing DDoS using Bash + Docker Kali

bash fire-superiorty-hydra.sh

once at a given time to avoid crashing your Kali Linux

Aim well & make it count ;)

12. Open-source PHP-Backdoors from Github

Let's thank to the backdoors contributors ;)

i. https://github.com/1337r0j4n/php-backdoors

Usage =>

git clone https://github.com/1337r0j4n/php-backdoors.git

ii. https://github.com/tennc/webshell/tree/master

Usage =>

git clone https://github.com/tennc/webshell.git

iii. https://github.com/bartblaze/PHP-backdoors

Usage =>

git clone https://github.com/bartblaze/PHP-backdoors.git

https://github.com/topics/php-webshell-backdoor

13. Tons of Mr. Victim gors

暴打渣男檸檬茶

i. 19 Win10 gor Download

https://www.microsoft.com/en-hk/software-download/windows10

ii. CentOS stream 9 gor Download

https://mirror.stream.centos.org/9-stream/BaseOS/x86_64/iso/

iii. Debian 12 gor Download

https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/debian-12.5.0-amd64-netinst.iso

Part 2 - Internet Attack on Titans

BGP

BGP-ddos

See ./BGP-DoS/destroying the Internet.docx

Watch the youtube tutorial & understand all concepts

Part 3 - Private Network based attacks OSI Layer 2-4

We'll be using Python Scapy module for Network sniffing, packets manipulations, spoofing and so on ;)

Python Scapy

i. Network sniffing

python3 ./Port-scanner/Python/port-scanner.py

cd ./Port-scanner/Rust/ && sudo cargo run -- -j 10000 IP_ADDR

ii. Network Point-to-point connections sniffer

python3 ./P2P/find-p2p.py;

Enter Network_Addr/CIDR

iii. Arp-spoofing illustrated

ARP spoofing

python3 ./Arp-spoofer/arp-spoofer.py;

Tutorial

https://www.youtube.com/watch?v=CW0Mf9qGBOc&t=117s

iv. Spanning Tree Protocol attack illustrated

SPT attack

python3 ./STP-attack/stpHackRootPort.py;

Theory

https://www.youtube.com/watch?v=japdEY1UKe4

Journals

https://notes.networklessons.com/stp-root-bridge-selection

v. TCP Syn-Ack flooding illustrated

Sync Flood

python3 ./Sync-flooder/flooder.py;

Hping3 + TMUX

Edit your target_IP & spoof_IP first in ./Sync-flooder/hping3-buster.sh

bash ./Sync-flooder/fire-superiority-hping3.sh;

Theory explained

https://www.youtube.com/watch?v=tClcCMrXzek&t=385s

Part 4 - Compiling Python scripts .py => .exe

Best Practices for compiling malware to .exe:

Python compilers

Approach:

Use Python compiler pyinstaller

pyinstaller

python -m pyinstaller single.py --onefile --noconsole;

FREE tutorial

https://www.youtube.com/watch?v=bqNvkAfTvIc&list=PLdbtMgV1x_BgL1Zns9Nx3f8qG_IRU8G4A&index=25&pp=gAQBiAQB

Reside the only .exe to your targets

Gain persistency using Windows Registry keys in your python code

regedit regedit

SSH Tunneling Hands-on Tutorial 1

Hands-on

Read illustrated guide from:

./Bypass-Firewall-SSH-Tunneling/Bypassing IGS Fortinet Firewall port 443.docx

Once you established a secret SSH tunnel

Feel free to launch the Backdoor client on your victims

Traffic derived from Downloading/Uploading files from/to Victims are securely encrypted as a Deep Web

Intrusion Detection Systems won't be able to trace encrypted SSH tunnelled traffic ;)

This gives you an extra edge in maintaining persistency on your Victims (Botnets) ;)

Pre-requisites:

An AWS EC2 Linux with Public port forwarding & GatewayPorts open

https://www.youtube.com/watch?v=Wp7boqm3Xts&t=870s

SSH Tunneling Tutorial 2

https://www.youtube.com/watch?v=pk5OF8XZSFM

Part 6 - The Phantom Fileless attacks on any platforms

Phantom attacks

Encapsulated maliacious payloads on Windows/ Linux:

Traditionally, you'll need to change Execution Policy in Powershell on a Windows computer

Bypass PS Exec Policy

Yet, we can somehow bypass this Execution Policy settings using just cmd.exe to run:

PowerShell.exe -windowStyle hidden -command "line1; line2; line3; line4;"

This bypasses PowerShell Execution-Policy & PS-Remoting settings :D

As most of us are using Win10/11 in 2024 :D

PowerShell becomes the default runtime on our Windows :D

This technique is extremely useful to wear your black hat in a strict Enterprise environment ;)

NOT many in-house Cybersecurity professionals have to know-how to catch you ;)

Catch me if you can ;) Leonardo

Hands-on example

Please try:

open cmd.exe

powershell.exe -windowStyle hidden -command "$telnet = test-netConnection -computerName 127.0.0.1 -port 8080; $telnet | Out-File -FilePath .\telnet.txt -Encoding utf8;"

To verify whether telnet.txt comes up

ls | findstr telnet

You see? This Fileless technique can even run Telnet without enabling Telnet on your Windows ;)

Linux:

Bash terminal:

printf "import time, rotatescreen as rs\npd = rs.get_primary_display()\nangle_list = [0, 90, 180, 270, 90, 180, 90, 270]\nwhile True:\n\tfor i in range(5):\n\t\tfor x in angle_list:\n\t\t\tpd.rotate_to(x)\n\t\t\ttime.sleep(0.5)" > virus.py &&

python ./virus.py &&

rm -rf ./virus.py

Part 7 - DevOps tools exploitations

Remember that, DevOps are always LAZY :D

DevOps operating in an Enterprise environment are essentially working with large numbers of networks, environments and OS

DevOps do NOT have the brain-throughput to remember every single god damned long+multi-factored password

DevOps store frequently used passwords as Credential instances

Ansible Tower saved credentials

within an Ansible Tower, or use notepad to store all the passwords, then rush through every automation task running on Ansible Towers

Exploit DevOps' laziness will necessarily give you an extra edge as a Black Hat

Grab an Ansible Tower => Enumerate a user with careless saved password for Privilege Escalation => using "ARGUMENTS" entry to bypass artifactory code screening without using a god-damned .yml playbook

Hacking w/ Ansible

Send Fileless malicious payloads using Ansible Tower

Modules => Select win_command

ARGUMENTS:

powershell.exe -windowStyle hidden -command "line1; line2; line3; line4;"

Hands-on example

Please try:

modules: select win_cmd

in ARGUMENTS:

powershell.exe -windowStyle hidden -command "$telnet = test-netConnection -computerName 127.0.0.1 -port 8080; $telnet | Out-File -FilePath C:\temp\telnet.txt -Encoding utf8;"

Verify by Ansible "ARGUMENTS" tab:

powershell.exe -windowStyle hidden -command "ls C:\temp | findstr telnet; Get-Content C:\temp\telnet.txt;"

Linux:

Bash terminal:

printf "import time, rotatescreen as rs\npd = rs.get_primary_display()\nangle_list = [0, 90, 180, 270, 90, 180, 90, 270]\nwhile True:\n\tfor i in range(5):\n\t\tfor x in angle_list:\n\t\t\tpd.rotate_to(x)\n\t\t\ttime.sleep(0.5)" > virus.py &&

python ./virus.py &&

rm -rf ./virus.py

Thus, no one can easily trace what the heck you did to them

If you persist doing these crazy shit without formal permissions

I hope you do NOT get caught & go to jail...

Do NOT blame this repository owner

This repository owner NEVER suggests hacktivism

This repository owner suggests continuous learning & defending by mimicking why & how malicious hackers portray their skills

Part 8 - Malware Development

1. Backdoor PoC

Backdoor

FREE Tutorials

1. Python networking

https://www.youtube.com/watch?v=3UOyky9sEQY&list=PLdbtMgV1x_BiFtjWTuylQbz8cF77F5bQA&pp=gAQBiAQB

2. Python Socket

https://www.youtube.com/watch?v=xA7qrXwXUlg&list=PLdbtMgV1x_BinAQ6F7FEaVEE0B7TP1NGS&pp=gAQBiAQB

https://www.youtube.com/watch?v=3QiPPX-KeSc&list=PLdbtMgV1x_BgL1Zns9Nx3f8qG_IRU8G4A&index=26&t=16s&pp=gAQBiAQB

Victims' machines:

You will need to get your victims to connect to your network

e.g. Wireguard VPN

Wireguard

You victims will be able to connect to your network as Backdoor client only

*** Usage ***

*** Read the guide in ./Backdoor-verB/Backdoor coding.docx***

Deployment?

Use your creativity to find the way to make victims run vpn -> run code in reverse_shell.py

A USB?

An e-mail?

Ansible Tower?

Wireguard VPN?

Use your creativity ;)

Backdoor Server:

Use your creativity to host server.py in somewhere safe ;)

May be some hackers' playground like OVH Cloud, with Indian Cloud servers hosted in India Data Centers? :D

OVH Cloud

2. Ransomware PoC:

Ransomware

FREE Tutorial

https://www.youtube.com/watch?v=bEA8HI_I5bQ&list=PLdbtMgV1x_BgL1Zns9Nx3f8qG_IRU8G4A&index=24&pp=gAQBiAQB

Ransomware & Backdoor can only be used when victims connect to your server network locally using VPN

These attacks do NOT operate in WAN

Start using

cd ./Malware-Dev &&

Edit the listening server IP_ADDRESS in server.py in line 11

Edit the listening port to your attacker machine IP & desired port no.

Run the server.py to start listening

python ./Ransomware/server.py;

On your victim's machine

Edit the IP_ADDRESS in line 109 to attacker's machine IP

Edit the listening port no. same as in server.py

Run encryption.exe or code from encryption.py by whatever malicious means you can imagine ;)

Go back to your attacker's machine

Check out encrypted_hosts.txt for decryption key

On victim's machine, run decryption.py code by whatever means

Enter the decryption key in 'encrypted_hosts.txt' to decrypt the locked files

You may change the path for encryption where the encryption script runs at

Enjoy :D

=================== Post PoC Updates ====================

Official date of formation of PoC group: 14 Dec 2023


V for vendetta knives

1st PoC Period of Red teaming: 16 Jan 2024 to 24 Feb 2024


PoC status: Completed


Reporting...

Pass = Could defend


Failed = Failed to defend


Web Scraping (Java): pass


Generic XSS result: pass


Man-in-the-middle defense: pass


SQL Injection: pass


PHP Backdoor upload: pass


Nmap recon: failed


Hydra Web Brute-forcing: pass


Layer 7 DDoS (HTTP Flood): failed


Layer 4 DDoS (SYN ACK Flood): failed


Layer 3 DDoS (ICMPv4 Flood): failed


Layer 2 DDoS (ARP spoof Flood): failed


Official record of Maximum Terminal Sessions available for DDoS: 1000 concurrent sessions of terminals


Official record of Maximum Concurrency for JMeter: 500k concurrency


Officially tested best SystemInfo for a single unit of DDoS Kali Docker container/Kali VM: 8 CPU & 4GB RAM


Where are we heading to?

Practical experiments indicate that DDoS attacks are the most effective & practical way to take down targets against Enterprises in Cyber Warfare

While Sneaky MSF venoms & Fileless hacking using By-pass are the most effective Social Engineering attacks against personnel

Direction

No one knows, this PoC was initiated in a completely unknown state...but completed successfully ;)

We might be developing Wireguard VPN + hosting a PoC only Backdoor Server somewhere safe to simulate Ransomware + Backdoor attacks & record the entire process?

We might be re-inventing the wheel & doing some CI for existing artifacts?

We might be switching to Golang/Rustlang/C ?

No one knows where the future holds ;)

Hacking ground:

Previously: On-prem Bare Metal

Future: Unknown Cloud?🤔

Network programming:

Rapid Prototyping: Python Scapy

Future Implementation: Unknown programming language(s) Golang?🤔

Virtualization:

Previously: Kali VM + Docker-compose in ESXi

Future: Docker-compose + Terraform + Ansible?🤔

Target DDoS sessions: Unknown

Target DDoS concurrency: Unknown

Our future where being: Unknown

Glory to Ukraine
V for vendetta spinning knives
我妻由乃

Explosion
攞你命3000