- Goal of this is page is to document and list tradecraft, and techniques
- The RedTeam page will contain all info on building tools, or creating payloads
- For OS-Specific Tactics & Resources, See Following 3 Links:
- Following Links are Platform Agnostic and Exist on This Page
- Hardware-based Privilege Escalation
- Post-Exploitation General
- Tactics
- 101
- Talks & Presentations
- Anti-Blue
- Attacking Disk-Encryption
- CI/CD Systems
- Citrix
- Credential Dumping through Fake Services
- Collection
- Electron/JS Bridges
- ENV Variables
- File-Cloning
- File-Extensions
- HID Device-based Attack
- IDN/Homograph Abuse
- Infra-As-Code(Iaac)
- IP-Obfuscation
- Java
- Lateral Movement through 3rd-Party Services
- Local Phishing
- Mobile-Device-Management(MDM)
- Password Managers
- Pass-the-Cookie
- Payload Keying
- Persistence
- Person-in-the-Middle
- Printers
- Point-of-Sale Machines
- Proxied Execution
- SAP
- Shadow-Bunny
- Virtual-Desktop-Infrastructure(VDI)
- Zip
- Handling Shells
- Backdooring
- Execution
- Discovery
- Exfiltration
- Persistence
- Miscellaneous
- Tactics
- Pivoting & Tunneling
- Secured Environment Breakouts/Escapes
- Writeups
- General
- Windows DMA Attacks : Gaining SYSTEM shells using a generic patch
- Where there's a JTAG, there's a way: Obtaining full system access via USB
- Snagging creds from locked machines - mubix
- Bash Bunny QuickCreds – Grab Creds from Locked Machines
- PoisonTap
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
- Rowhammer
- Exploiting the DRAM rowhammer bug to gain kernel privileges
- Row hammer - Wikipedia
- Another Flip in the Wall of Rowhammer Defenses
- rowhammer.js
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript
- Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
- Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors
- Abstract. Memory isolation is a key property of a reliable and secure computing system — an access to one memory ad- dress should not have unintended side e ects on data stored in other addresses. However, as DRAM process technology scales down to smaller dimensions, it becomes more diffcult to prevent DRAM cells from electrically interacting with each other. In this paper, we expose the vulnerability of commodity DRAM chips to disturbance errors. By reading from the same address in DRAM, we show that it is possible to corrupt data in nearby addresses. More specifically, activating the same row in DRAM corrupts data in nearby rows. We demonstrate this phenomenon on Intel and AMD systems using a malicious program that generates many DRAM accesses. We induce errors in most DRAM modules (110 out of 129) from three major DRAM manufacturers. From this we conclude that many deployed systems are likely to be at risk. We identify the root cause of disturbance errors as the repeated toggling of a DRAM row’s wordline, which stresses inter-cell coupling e ects that accelerate charge leakage from nearby rows. We provide an extensive characterization study of disturbance errors and their behavior using an FPGA-based testing plat- form. Among our key findings, we show that (i) it takes as few as 139K accesses to induce an error and (ii) up to one in every 1.7K cells is susceptible to errors. After examining var- ious potential ways of addressing the problem, we propose a low-overhead solution to prevent the errors.
- General
- Tools
- Inception
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe HW interfaces.
- PCILeech
- PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers are needed on the target system.
- physmem
- physmem is a physical memory inspection tool and local privilege escalation targeting macOS up through 10.12.1. It exploits either CVE-2016-1825 or CVE-2016-7617 depending on the deployment target. These two vulnerabilities are nearly identical, and exploitation can be done exactly the same. They were patched in OS X El Capitan 10.11.5 and macOS Sierra 10.12.2, respectively.
- rowhammer-test
- Program for testing for the DRAM "rowhammer" problem
- Tools for "Another Flip in the Wall"
- Inception
- Tactics
- 101
- General Articles/Blogposts/Writeups
- Talks & Presentations
- Tactical Post Exploitation - Carlos Perez(Derbycon2011)
- The presentation will cover the techniques and methods used by penetration testers and hackers, how do they enumerate and perform their tasks once on a compromised system and how to detect the tell tales signs of their presence and actions.
- Operating in the Shadows - Carlos Perez(Derbycon2015)
- This talk will focus detecting and avoiding detection on Windows based environments. Many defenders don't know what to look for and where to detect presence of an attacker in their network. Many pentesters do not even know what trail of cookie crumbs their action leave on a target network so as to recommend defenders how to better detect and mitigate. Also covered will be how to leave an even smaller footprint on the target network so as to minimize chance of detection on customer with proper security practices.
- Agentless Post-Exploitation - Raphael Mudge(2016)
- "This presentation is a survey of techniques to conduct post-exploitation against a target without the use of malware."
- Living off the land: enterprise post-exploitation - Adam Reiser(Derbycon2018)
- You've compromised that initial server and gained a foothold in the target network: congratulations! But wait - the shadow file has no hashes but root, the ssh keys have strong passphrases, and all the interesting traffic is encrypted - there's nothing of value here! Or is there? In this talk, I will explore post-exploitation techniques for turning your compromised bastion hosts into active credential interceptors under a variety of blue team monitoring scenarios.
- Advancing Video Application Attacks with Video Interception, Recording, and Replay - Jason Ostrom, Arjun Sambamoorthy(2009)
- Hacking Dumberly Redux - More Dumberer - Tim Medin(WWHF Hackin' Cast 2020)
- Tim Medin discusses the dumbest red team tricks and hacks encountered over the years. We are going to take the A out of APT (again), because so few attackers really need to use advanced techniques. We'll also discuss the simple defenses that make an attacker's life much more difficult.
- Tactical Post Exploitation - Carlos Perez(Derbycon2011)
- Anti-Blue
- Attacking Disk-Encryption
- CI/CD Systems
- General/Agnostic
- 10 real-world stories of how we’ve compromised CI/CD pipelines - Aaron Haymore, Iain Smart, Viktor Gazdag, Divya Natesan, Jennifer Fernick(2022)
- Pentesting Git source repositories - Guillaume Quéré(2020)
- “CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter - Ed Overflow(2019)
- Red Teaming DevOps - Jose Hernandez & Rod Soto(DEFCON RTV)
- A set of practices in software development and information technology known as DevOps has become the leading reference for software development and IT operations that aim to provide continuous integration, delivery and software quality assurance. These practices have brought many advantages such as rapid development and delivery of software and system platforms, along with integration with cloud platforms. These new advantages come with a price and that price is the augmentation of attack surface. This presentation shows the different attack vectors in the CI/CD DevOps attack surface broken down by components and implications for those enterprises using DevOps practices. Specific attack tools along with methodology will be provided to showcase with proof of concepts how to apply read team methodology against DevOps practices.
- CircleCI
- Shaking secrets out of CircleCI builds - insecure configuration and the threat of malicious pull requests - Nathan Davidson(2020)
- "In this writeup, I'm going to extend a little bit on the 'secrets in CI logs' research and go beyond looking for secrets that are already out there available in the public build logs, to detailing a way to force secrets to reveal themselves. To do this, I will be specifically focusing on the CircleCI platform, covering a potentially dangerous configuration state that can lead to secret disclosure with a little help from Github's open nature, and how to detect this as a researcher with nothing more than public read access to the Github repo and its CircleCI project's build logs."
- Shaking secrets out of CircleCI builds - insecure configuration and the threat of malicious pull requests - Nathan Davidson(2020)
- GitHub
- GitDorker
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
- GitOops
- GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines and GitHub access controls. It works by mapping relationships between a GitHub organization and its CI/CD jobs and environment variables.
- GitDorker
- Gitlab
- Abusing GitLab Runners - Nick Frichette(2020)
- "While evaluating options for a small project at home I started looking into GitLab Runners to compliment my existing private GitLab instance. In this article I’d like to explain what Runners are, roughly how they work, and how you can abuse them on your next penetration test or red team engagement."
- Abusing GitLab Runners - Nick Frichette(2020)
- Jenkins
- General/Agnostic
- Citrix
- Credential Dumping through Fake Services
- Collection
- Agnostic
- localdataHog
- String-based secret-searching tool (high entropy and regexes) based on truffleHog. The main difference is that whereas truffleHog was built with git repositories in mind, this tool is an attempt of applying truffleHog approach (potential secret searching leveraging both regular expressions and entropy calculation) against any data (although for it to be effective, data should not be encoded nor compressed).
- LaZagne
- The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software.
- DumpsterDiver
- DumpsterDiver is a tool used to analyze big volumes of various file types in search of hardcoded secrets like keys (e.g. AWS Access Key, Azure Share Key or SSH keys) or passwords. Additionally, it allows creating a simple search rules with basic conditions (e.g. reports only csv file including at least 10 email addresses). The main idea of this tool is to detect any potential secret leaks. You can watch it in action in the demo video or read about all its features in this article.
- SharpCloud
- SharpCloud is a simple C# utility for checking for the existence of credential files related to Amazon Web Services, Microsoft Azure, and Google Compute.
- Offensive Debugging: .NET Poops of Gold - Leron Gray(CactusCon10)
- This talk will discuss finding the golden nuggets in .NET dumps using existing tools and provide scenarios in which exercising forensic skills can be a game-changer in offensive security operations. Additionally, this talk will demonstrate Turdshovel, a tool for quickly analyzing .NET dumps for objects of interest.
- localdataHog
- Keyloggers
- Notes on keyloggers - Action Dan(2021)
- HeraKeylogger
- Chrome Keylogger Extension
- Meltdown PoC for Reading Google Chrome Passwords
- Slack
- Slackhound
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, locations, files, and other objects.
- SlackPirate
- Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
- Slackhound
- SSH-keys
- Driftwood
- Driftwood is a tool that can enable you to lookup whether a private key is used for things like TLS or as a GitHub SSH key for a user. Driftwood performs lookups with the computed public key, so the private key never leaves where you run the tool. Additionally it supports some basic password cracking for encrypted keys.
- Driftwood
- Agnostic
- Electron/JS Bridges
- The JavaScript Bridge in Modern Desktop Applications - Parsia(2021)
- electron-inject
- Inject javascript into closed source electron applications e.g. to enable developer tools for debugging.
- ENV Variables
- File-Cloning
- File-Extensions
- Filesec.io
- Stay up-to-date with the latest file extensions being used by attackers.
- Filesec.io
- HID Device-based Attack
- IDN/Homograph Abuse
- CVE-2021-42694
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)
- RTLO-attack
- This is a really simple example on how to create a file with a unicode right to left ove rride character used to disguise the real extention of the file. In this example I disguise my .sh file as a .jpg file.
- Blog
- CVE-2021-42694
- Infra-As-Code(Iaac)
- General/Agnostic
- Enterprise Offense: IT Operations [Part 1] - Post-Exploitation of Puppet and Ansible Servers - Tandy Bose
- MOSE (Master Of SErvers)
- MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies to leverage them to compromise environments. CM tools, such as Puppet, Chef, Salt, and Ansible are used to provision systems in a uniform manner based on their function in a network. Upon successfully compromising a CM server, an attacker can use these tools to run commands on any and all systems that are in the CM server’s inventory. However, if the attacker does not have experience with these types of tools, there can be a very time-consuming learning curve. MOSE allows an operator to specify what they want to run without having to get bogged down in the details of how to write code specific to a proprietary CM tool. It also automatically incorporates the desired commands into existing code on the system, removing that burden from the user.
- Ansible
- Chef
- Puppet
- Salt
- General/Agnostic
- IP-Obfuscation
- IPFuscator
- IPFuscation is a technique that allows for IP addresses to be represented in hexadecimal or decimal instead of the decimal encoding we are used to. IPFuscator allows us to easily convert to these alternative formats that are interpreted in the same way.
- Blogpost
- Cuteit
- A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload.
- IPFuscator
- Java
- Tool Release – shouganaiyo-loader: A Tool to Force JVM Attaches - Jeff Dileo(2021)
- shouganaiyo-loader: Forced Entry for Java Agents
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regardless of whether or not the JVM has disabled the agent attach API.
- Lateral Movement through 3rd-Party Services
- Out of The Box - Lateral Movements - Kevin Dick, Steven F(2019)
- Browser Pivoting
- Browser Pivot for Chrome - ijustwannaredteam
- Today’s post is about Browser Pivoting with Chrome. For anyone unaware of Browser Pivoting, it’s a technique which essentially leverages an exploited system to gain access to the browser’s authenticated sessions. This is not a new technique, in fact, Raphael Mudge wrote about it in 2013. Detailed in the linked post, the Browser Pivot module for Cobalt Strike targets IE only, and as far as I know, cannot be used against Chrome. In this post we’re trying to achieve a similar result while taking a different approach – stealing the target’s Chrome profile in real time. Just a FYI, if you have the option to use Cobalt Strike’s Browser Pivot module instead, do so, it’s much cleaner.
- CursedChrome
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
- Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely - wunderwuzzi(2020)
- Browser Pivot for Chrome - ijustwannaredteam
- Local Phishing
- Mobile-Device-Management(MDM)
- Having Fun with Google MDM Solution - Ahmad Abolhadid(2021)
- MobileIron MDM Contains Static Key Allowing Account Enumeration - Matt Burch(2021)
- rustyIron
- This tool represents a communication framework for navigating MobileIron's MDM authentication methods, allowing for account enumeration, single-factor authentication attacks, and message decryption.
- Password Managers
- CyberArkTools
- Some Python tooling to for example try to decrypt CyberArk .cred credential files
- Breaking LastPass: Instant Unlock of the Password Vault - Oleg Afonin(2020)
- CyberArkTools
- Pass-the-Cookie
- Pass the Cookie and Pivot to the Clouds - wunderwuzzi
- An adversary can pivot from a compromised host to Web Applications and Internet Services by stealing authentication cookies from browsers and related processes. At the same time this technique bypasses most multi-factor authentication protocols.
- Pass the Cookie and Pivot to the Clouds - wunderwuzzi
- Payload Keying
- Breaking Detection with X86 ISA Specific Malware - Chris Hernandez(Disobey2020
- Detection evasion in most enterprise networks is a problem that attackers have to deal with. In the modern enterprise network a number of defenses can intercept and block, detonate or analyze your malware/agent before it even achieves execution on a target. But what if an attacker could create malware that was supported by the target machine and not supported by the sandbox or other detection tools? The idea of keyed malware is not new; however, this talk looks at keying malware to leverage x86 Instruction Set Architecture (ISA) features supported by specific Intel and AMD CPUs, instead of from a higher-level abstraction as has been done previously with malware keyed to the operating system. In this talk, I will demonstrate and showcase how x86 instruction set architecture (ISA) specific features that allow for sandbox detection and bypass in instances where the x86 ISA version is mismatched between the target environment and the analysis environment. I will discuss and demonstrate methods for implementing ISA detection bypass techniques into the malware development lifecycle. Additionally, I will discuss the ramifications of an ever growing instruction set for the enterprise defender.
- Breaking Detection with X86 ISA Specific Malware - Chris Hernandez(Disobey2020
- Persistence
- An Encyclpwnia of Persistence - Skip Duckwall, Will Peteroy(Derbycon2013)
- "Description: While I was working on a Linux boot CD for Red Team operations I started researching various persistence techniques that were out there in “the real world”. Pretty soon a couple of pages of notes became a notebook full of information. Based on public information from incident reports, AV vendors, blogs, and con talks, I started trying to categorize the various techniques to make them easier to digest. One thing that immediately jumped out was that nobody had apparently tried to do this before. With help from another former Red Teamer, Will, we were able to categorize over 20 different ways that somebody could attain persistence. Our hope is that our talk will benefit both the folks who have to defend and those who provide threat emulation by providing details about real world persistence methods."
- An Encyclpwnia of Persistence - Skip Duckwall, Will Peteroy(Derbycon2013)
- Person-in-the-Middle
- See 'Network Attacks' page.
- Printers
- See 'Network Attacks' page. Or Linux Post-Ex if you've already popped one.
- Point-of-Sale Machines
- Breaking Credit Card Tokenization Without Cryptanalysis - Tim MalcomVetter(Derbycon2016)
- Credit Card Tokenization is a very popular antidote to costly and time-consuming PCI regulations, but are all implementations equally secure? Early studies on tokenization focused on the cryptanalysis of the token generation process, especially when early implementations sought to create 16 digit numeric tokens to satisfy constraints in legacy commerce systems. Fast forward to 2016, most of those problems do not exist today; however, anecdotes from consulting with Fortune 500s suggest other insecure properties not involving crypto can vary and emerge in tokenization systems. This talk will dig into several sanitized examples from consulting engagements which reduce ?PCI Compliant? Credit Card Tokenization from ?silver bullet? to ?speed bump? status when big-picture security controls are missing. Specifically: abusing separation of duties by rogue partial insiders via public APIs commonly found in e-commerce applications; discovery of accidental side channels of critical information flow, such as timing analysis or response differentiation, which can be abused to reveal full PANs (primary account numbers); whether DevOps cultures could promote rogue admins abusing tokenization presentation logic implemented in JavaScript; and for good measure: some common programming defects which at best render tokenization pointless, and at worst could allow for a breach. With each example, we?ll look at potential solutions.
- Breaking Credit Card Tokenization Without Cryptanalysis - Tim MalcomVetter(Derbycon2016)
- Proxied Execution
- SAP
- PowerSAP
- PowerSAP is a simple powershell re-implementation of popular & effective techniques of all public tools such as Bizploit, Metasploit auxiliary modules, or python scripts available on the Internet. This re-implementation does not contain any new or undisclosed vulnerability.
- RFCpwn
- An SAP enumeration and exploitation toolkit using SAP RFC calls https://warroom.rsmus.com/sap-recon-cve-2020-6287/ https://github.com/carlospolop/hacktricks/pull/29/commits/b003ef83d8fba4cbe941215f5a1bd07eb435ec4e?short_path=c605337#diff-c605337b642ce1648e442d4b6b69042e682b9c3448b46e0e129be4927d5405f7
- PowerSAP
- Shadow-Bunny
- Beware of the Shadowbunny - Using virtual machines to persist and evade detections - wunderwuzzi(2020)
- Welcome the Shadowbunny - Johann Rehberger(BSidesSG2020)
- Slides
- In this talk we will explore usage of virtual machines for lateral movement. There are multiple reasons why you should add this technique to your red teaming knowledge-base and skill set. We also highlight how we can build better detection for catching VM misuse. A Shadowbunny is basically a virtual machine (VM) instance that is deployed by an adversary on a target host to pivot and provide persistence and at the same time evade detection. During red teaming operations the Shadowbunny technique has been used by the presenter multiple teams over the last couple of years. The VM itself does not have any security monitoring and is entirely attacker controlled.
- IceRat evades antivirus by running PHP on Java VM - Karsten Hahn
- Virtual-Desktop-Infrastructure(VDI)
- Hacking VDI, Recon and Attack Methods - Patrick Coble(Derbycon2017
- VDI Deployments are in over 90% of all the Fortune 1000 companies and are used in almost all industry verticals, but are they secure? The goal of most VDI deployments is to centrally deliver applications and/or desktops to users internally and externally, but in many cases their basic security recommendations haven't fully deployed, allowing an attacker to gain access. This talk will review the basic design of the top two solution providers, Citrix and VMware. We will go over these solutions strengths and weaknesses and learn how to quickly identify server roles and pivot. We will also examine all the major attack points and their defensive counters. If you or if you have a client that has a VDI Deployment you don't want to miss this talk.
- Hacking VDI, Recon and Attack Methods - Patrick Coble(Derbycon2017
- Vulnerability Scanners
- Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions - Timothy Wright, Jacob Griffith(Derbycon2019)
- Many IT administration systems on the market today implement some form of automated discovery process for identifying and cataloging new devices attached to the network. These discovery services often use valid credentials to access the devices for credentialed reviews/scans to improve the accuracy of the reporting. To make matters worse, these credentials are often elevated on the network and potentially whitelisted from any deception or endpoint protection suites.In this talk, we will outline several ways to abuse these services to gain legitimate credentials for a given network. Specifically, our research focused on a couple common security and management systems, but the implications are widespread. Research and tools to be released at con to help red teams demo risk.
- Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions - Timothy Wright, Jacob Griffith(Derbycon2019)
- Zip
- Critical .zip vulnerabilities? - Zip Slip and ZipperDown - LiveOverflow(2018
- What is going on with .zip files. What is this new critical vulnerability that seems to affect everything? ... old is new again.
- evilarc
- Create tar/zip archives that can exploit directory traversal vulnerabilities
- Critical .zip vulnerabilities? - Zip Slip and ZipperDown - LiveOverflow(2018
- Things
- Handling Shells
- penelope
- Penelope is an advanced shell handler. Its main aim is to replace netcat as shell catcher during exploiting RCE vulnerabilities. It works on Linux and macOS and the only requirement is Python >= 3.6. It is a single script, it needs no installation or any 3rd party dependency and hopefully it will stay that way.
- Alveare
- Multi-client, multi-threaded reverse shell handler written in Node.js. Alveare (hive in italian) lets you listen for incoming reverse connection, list them, handle and bind the sockets. It's an easy to use tool, useful to handle reverse shells and remote processes.
- penelope
- Handling Shells
- Backdooring
- Articles/Blogposts/Writeups
- Hide meterpreter shellcode in executable - Emeric Nasi(2014)
- Backdooring Plugins - AverageJoe(2018)
- Backdooring Torrents - GIronSec(2019)
- [Backdoor 101] Backdooring PE File by Adding New Section Header - Capt Meelo(2018)
- Introduction to Manual Backdooring - abatchy17
- Undetectable backdooring PE file - Haider Mahmood(2017)
- Backdooring PE File - rottenbeef(2019)
- Distribution of malicious JAR appended to MSI files signed by third parties - Bernardo.Quintero(2019)
- Jar Files: Analysis and Modifications - 0xdf(2020)
- Talks/Presentations/Videos
- Tools
- PympMyBinary
- Python tool to infect binaries(Win32/64) with shellcode.
- PympMyBinary
- Articles/Blogposts/Writeups
- Execution
- Tools
- Shellpaste
- Tiny snippet of code that pulls ASCII shellcode from pastebin and executes it. The purpose of this is to have a minimal amount of benign code so AV doesn't freak out, then it pulls down the evil stuff. People have been doing this kind of stuff for years so I take no credit for the concept. That being said, this code (or similar code) works surprisingly often during pentests when conventional malware fails.
- Shellpaste
- Payloads
- Staged vs Stageless Handlers - OJ Reeves(2013)
- [Staged Payloads – What Pen Testers Should Know - Raphael Mudge(2013)]
- Deep Dive Into Stageless Meterpreter Payloads - OJ Reeves(2015)
- Payload Types in the Metasploit Framework - offensive-security
- Tools
- Discovery
- Browsers
- Articles/Blogposts/Writeups
- The Curious case of Firefox’s DevTools Storage - phl4nk(2020)
- TL;DR – Firefox stores Dev tool console data permanently (unless manually deleted). Use the script to decompress the stored data and recover any potential goodies (mainly from devs running scripts in the console).
- DevToolReader
- Parses Indexeddb files - used to extract devtools console history
- Retrieving Data from Thunderbird and Firefox - VIVI(2020)
- Cookie Crimes and the new Microsoft Edge Browser - Wunderwuzzi(2020
- Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely - Wunderwuzzi(2020)
- Hands in the Cookie Jar: Dumping Cookies with Chromium’s Remote Debugger Port - Justin Bui(2020
- Abusing Google Chrome extension syncing for data exfiltration and C&C - Bojan(SANS 2021)
- The Curious case of Firefox’s DevTools Storage - phl4nk(2020)
- Tools
- EyeWitness
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- gowitness
- a golang, web screenshot utility using Chrome Headless
- WitnessMe
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
- Firepwd.py
- Firepwd.py, an open source tool to decrypt Mozilla protected passwords
- ThunderFox
- Retrieve saved credentials from Thunderbird and Firefox.
- ChromeTools
- A collection of tools to abuse chrome browser
- firefox-cookiemonster
- Connect to Firefox debug port and issue a Javascript command to grab cookies
- comfortably-run
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol
- WhiteChocolateMacademiaNut
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies
- EyeWitness
- Articles/Blogposts/Writeups
- File Discovery
- localdataHog
- String-based secret-searching tool (high entropy and regexes) based on truffleHog.
- localdataHog
- Packet Sniffing
- See Network_Attacks.md
- Finding your external IP:
- Curl any of the following addresses:
ident.me, ifconfig.me or whatsmyip.akamai.com
- Determine Public IP from CLI
- Curl any of the following addresses:
- Virtual Machine Detection(VM Dection)
- How to determine Linux guest VM virtualization technology
- Virtualbox
- VirtualBox Detection Via WQL Queries
- Bypassing VirtualBox Process Hardening on Windows
- VBoxHardenedLoader
- VirtualBox VM detection mitigation loader
- Browsers
- Exfiltration
- Egress Testing
- Egress Testing using PowerShell
- Egress Buster Reverse Shell
- Egress Buster Reverse Shell – Brute force egress ports until one if found and execute a reverse shell(from trustedsec)
- Egress-Assess
- Egress-Assess is a tool used to test egress data detection capabilities
- File Transfer
- Articles/Blogposts/Writeups
- Platform-Neutral
- Updog
- Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
- ffsend
- Easily and securely share files and directories from the command line through a safe, private and encrypted link using a single simple command. Files are shared using the Send service and may be up to 1GB (2.5GB authenticated). Others are able to download these files with this tool, or through their web browser.
- Updog
- Egress Testing
- Persistence
- List of low-level attacks/persistence techniques. HIGHLY RECOMMENDED!
- How to Remotely Control Your PC (Even When it Crashes)
- Backdooring X
- Building a backdoored Binary
- Pybuild
- PyBuild is a tool for automating the pyinstaller method for compiling python code into an executable. This works on Windows, Linux, and OSX (pe and elf formats)(From trustedsec)
- Pybuild
- PYTHONPATH
- I'm In Your $PYTHONPATH, Backdooring Your Python Programs
- Pyekaboo
- Pyekaboo is a proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable. It's like "DLL Search Order Hijacking" for Python.
- Miscellaneous
- Redis
- Redis post-exploitation - Pavel Toporkov(ZeroNights18)
- We will overview the techniques of redis post-exploitation and present new ones. In the course of the talk, you will also find out what to do if a pentester or adversary has obtained access to redis.
- Redis post-exploitation - Pavel Toporkov(ZeroNights18)
- Tools to help generate payloads
- How to use msfvenom
- msfpc
- A quick way to generate various "basic" Meterpreter payloads via msfvenom (part of the Metasploit framework).
- Unicorn
- Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
- Redis
- Unsorted
- portia
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
- JVM Post-Exploitation One-Liners
- Oneliner-izer
- Convert any Python file into a single line of code which has the same functionality.
- portia
- Articles/Blogposts/Writeups
- A Red Teamer's guide to pivoting
- Pivoting into a network using PLINK and FPipe
- Pillage the Village Redux w/ Ed Skoudis & John Strand - SANS
- Browser Pivot for Chrome - cplsec
- Browser Pivoting (Get past two-factor auth) - blog.cobalstrike
- Windows Domains, Pivot & Profit - Fuzzynop
- Hola! In this write-up we will be looking at different ways to move laterally when compromising a Windows domain. This post is by no means exhaustive but it should cover some of the more basic techniques and thought processes.
- Performing port-proxying and port-forwarding on Windows - Wunderwuzzi(2020)
- On how to access (protected) networks - s3cur3th1ssh1t(2021)
- Overview of network pivoting and tunneling - Alexandre Zanni(2021)
- Bash
- Metasploit
- SSH
- Pivoting Ssh Reverse Tunnel Gateway
- SSH Gymnastics and Tunneling with ProxyChains
- SSH Cheat Sheet - pentestmonkey
- proxychains-ng
- proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
- Using sshuttle in daily work - Huiming Teo
- Proxyjump, the SSH option you probably never heard of - Khris Tolbert(2020)
- VPN
- WMIC
- Tools
- Multiple-Protocols
- Socat
- socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU line editor (readline), a program, or a combination of two of these. These modes include generation of "listening" sockets, named pipes, and pseudo terminals.
- Examples of use
- Socat Cheatsheet
- XFLTReaT
- XFLTReaT tunnelling framework
- gost
- GO Simple Tunnel - a simple tunnel written in golang
- Socat
- Discovery
- nextnet
- nextnet is a pivot point discovery tool written in Go.
- nextnet
- DNS
- HTTP/HTTPS
- SharpSocks
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell
- Chisel
- Chisel is a fast TCP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.
- SharpChisel
- C# Wrapper of Chisel from https://github.com/jpillora/chisel
- Crowbar
- Crowbar is an EXPERIMENTAL tool that allows you to establish a secure circuit with your existing encrypting TCP endpoints (an OpenVPN setup, an SSH server for forwarding...) when your network connection is limited by a Web proxy that only allows basic port 80 HTTP connectivity. Crowbar will tunnel TCP connections over an HTTP session using only GET and POST requests. This is in contrast to most tunneling systems that reuse the CONNECT verb. It also provides basic authentication to make sure nobody who stumbles upon the server steals your proxy to order drugs from Silkroad.
- A Black Path Toward The Sun(ABPTTS)
- ABPTTS uses a Python client script and a web application server page/package[1] to tunnel TCP traffic over an HTTP/HTTPS connection to a web application server. In other words, anywhere that one could deploy a web shell, one should now be able to establish a full TCP tunnel. This permits making RDP, interactive SSH, Meterpreter, and other connections through the web application server.
- pivotnacci
- Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents
- graftcp
- graftcp can redirect the TCP connection made by the given program [application, script, shell, etc.] to SOCKS5 or HTTP proxy.
- Tunna
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
- YARP/Yet Another Reverse Proxy
- YARP is a reverse proxy toolkit for building fast proxy servers in .NET using the infrastructure from ASP.NET and .NET. The key differentiator for YARP is that it's been designed to be easily customized and tweaked to match the specific needs of each deployment scenario.
- SharpSocks
- HTTP2
- gTunnel
- A TCP tunneling suite built with golang and gRPC. gTunnel can manage multiple forward and reverse tunnels that are all carried over a single TCP/HTTP2 connection. I wanted to learn a new language, so I picked go and gRPC. Client executables have been tested on windows and linux.
- gTunnel
- ICMP
- Hans - IP over ICMP - hans
- Source
- Hans makes it possible to tunnel IPv4 through ICMP echo packets, so you could call it a ping tunnel. This can be useful when you find yourself in the situation that your Internet access is firewalled, but pings are allowed.
- icmptx
- ICMPTX is a program that allows a user with root privledges to create a virtual network link between two computers, encapsulating data inside of ICMP packets.
- Hans - IP over ICMP - hans
- PowerShell
- RDP
- rdp2tcp
- rdp2tcp: open tcp tunnel through remote desktop connection.
- Socks Over RDP / Socks Over Citrix
- This tool adds the capability of a SOCKS proxy to Terminal Services (or Remote Desktop Services) and Citrix (XenApp/XenDesktop). It uses Dynamic Virtual Channel that enables us to communicate over an open RDP/Citrix connection without the need to open a new socket, connection or a port on a firewall.
- Socks Over RDP - Balazs Bucsay(2020)
- Using DVC to tunnel arbitrary connections inside of RDP - Guillaume Quéré(2020
- rdp2tcp
- SMB
- Piper
- Creates a local or remote port forwarding through named pipes.
- flatpipes
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.
- Invoke-PipeShell
- This script demonstrates a remote command shell running over an SMB Named Pipe. The shell is interactive PowerShell or single PowerShell commands
- Invoke-Piper
- Forward local or remote tcp ports through SMB pipes.
- Piper
- SSH
- SSHDog
- SSHDog is your go-anywhere lightweight SSH server. Written in Go, it aims to be a portable SSH server that you can drop on a system and use for remote access without any additional configuration.
- MeterSSH
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.
- powermole
- This program will let you perform port forwarding, redirect internet traffic, and transfer files to, and issue commands on, a host without making a direct connection (ie. via one or more intermediate hosts), which would undoubtedly compromise your privacy. This solution can only work when you or your peers own one or more hosts as this program communicates with SSH servers. This program can be viewed as a multi-versatile wrapper around SSH with the ProxyJump directive enabled. Powermole creates automatically a ssh/scp configuration file to enable key-based authentication with the intermediate hosts.
- SSHDog
- SOCKS/TCP/UDP
- RFC1928: SOCKS Protocol Version 5
- SOCKS: A protocol for TCP proxy across firewalls
- shootback
- shootback is a reverse TCP tunnel let you access target behind NAT or firewall
- ssf - Secure Socket Funneling
- Network tool and toolkit. It provides simple and efficient ways to forward data from multiple sockets (TCP or UDP) through a single secure TLS tunnel to a remote computer. SSF is cross platform (Windows, Linux, OSX) and comes as standalone executables.
- PowerCat
- A PowerShell TCP/IP swiss army knife that works with Netcat & Ncat
- Udp2raw-tunnel
- A Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP Environment). Its Encrypted, Anti-Replay and Multiplexed. It also acts as a Connection Stabilizer.)
- reGeorg
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
- redsocks – transparent TCP-to-proxy redirector
- This tool allows you to redirect any TCP connection to SOCKS or HTTPS proxy using your firewall, so redirection may be system-wide or network-wide.
- ligolo
- Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety (TLS certificate with elliptical curve). It is comparable to Meterpreter with Autoroute + Socks4a, but more stable and faster.
- proxychains-windows
- Windows and Cygwin port of proxychains, based on MinHook and DLL Injection
- rpivot
- This tool is Python 2.6-2.7 compatible and has no dependencies beyond the standard library. It has client-server architecture. Just run the client on the machine you want to tunnel the traffic through. Server should be started on pentester's machine and listen to incoming connections from the client.
- Secure Socket Funneling
- Secure Socket Funneling (SSF) is a network tool and toolkit. It provides simple and efficient ways to forward data from multiple sockets (TCP or UDP) through a single secure TLS tunnel to a remote computer. SSF is cross platform (Windows, Linux, OSX) and comes as standalone executables.
- Socks5
- A full-fledged high-performance socks5 proxy server written in C#. Plugin support included.
- VNC
- Invoke-Vnc
- Invoke-Vnc executes a VNC agent in-memory and initiates a reverse connection, or binds to a specified port. Password authentication is supported.
- jsmpeg-vnc
- A low latency, high framerate screen sharing server for Windows and client for browsers
- Invoke-Vnc
- VPN
- ligolo-ng
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
- ligolo-ng
- WMI
- PowerLurk
- PowerLurk is a PowerShell toolset for building malicious WMI Event Subsriptions. The goal is to make WMI events easier to fire off during a penetration test or red team engagement.
- Creeping on Users with WMI Events: Introducing PowerLurk
- PowerLurk
- Multiple-Protocols
- Secured Environment Escape
- 101
- Sandboxes from a pen tester’s view - Rahul Kashyap
- Description: In this talk we’ll do an architectural decomposition of application sandboxing technology from a security perspective. We look at various popular sandboxes such as Google Chrome, Adobe ReaderX, Sandboxie amongst others and discuss the limitations of each technology and it’s implementation. Further, we discuss in depth with live exploits how to break out of each category of sandbox by leveraging various kernel and user mode exploits – something that future malware could leverage. Some of these exploit vectors have not been discussed widely and awareness is important.
- Sandboxes from a pen tester’s view - Rahul Kashyap
- Adobe Sandbox
- chroot
- Breaking out of Contained Linux Shells
- Python Sandbox
- Escaping a Python sandbox with a memory corruption bug
- Breaking out of secured Python environments
- Sandboxed Execution Environment
- Documentation
- Sandboxed Execution Environment (SEE) is a framework for building test automation in secured Environments. The Sandboxes, provided via libvirt, are customizable allowing high degree of flexibility. Different type of Hypervisors (Qemu, VirtualBox, LXC) can be employed to run the Test Environments.
- Usermode Sandboxing
- ssh
- Windows
- Windows Desktop Breakout
- Kiosk/POS Breakout Keys in Windows - TrustedSec
- menu2eng.txt - How To Break Out of Restricted Shells and Menus, v2.3(1999)
- Kiosk Escapes Pt 2 - Ft. Microsoft Edge!! - H4cklife
- TL/DR: Microsoft Edge brings up Windows Explorer when you navigate to C:\ in the URL; Win+x can be used to access the start menu when shortcut keys are limited
- An excellent whitepaper detailing methods for breaking out of virtually any kind of restricted shell or menu you might come across.
- Breaking Typical Windows Hardening Implementations - Oddvar Moe(2020)
- VDI
- VirtualMachine
- Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - Joe Bialek
- L1TF (Foreshadow) VM guest to host memory read PoC
- This is a PoC for CVE-2018-3646. This is a vulnerability that enables malicious/compromised VM guests to read host machine physical memory. The vulnerability is exploitable on most Intel CPUs that support VT-x and EPT (extended page tables). This includes all Intel Core iX CPUs. This PoC works only on 64 bit x86-64 systems (host and guest).
- 101