Skip to content

Project build for joel and joshua students from Germany | course: Advanced Tactics in information security

Notifications You must be signed in to change notification settings

vaishnavucv/Project-winEvasion-Redteam

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Project-winEvasion-Redteam

This Project is build for Joyel and Joshua Master Applied Computer Science (MACS) students from Hochschule Schmalkalden - University of Applied Sciences Germany

Course: Advanced Tactics in Information Security

Note

This project integrates the MITRE ATT&CK framework with advanced red team tactics to identify and exploit security vulnerabilities in Windows systems.

Tip

Use PowerShell scripts with advanced obfuscation techniques to create Fully Undetectable (FUD) payloads that can bypass Windows Defender.

Important

Regular updates to FUD payloads are necessary to keep up with the latest Windows security features and ensure continued effectiveness.

Attack - EVENT TIME LINE

Att&ck Time Line

Attack and C2 Setup

  1. Ubuntu Server Configuration for C2 and Mail Server
  2. Powershell Script to Payload.exe
  3. Python Script for Sending Mail with Payload.exe
  4. Metasploit Payload Generating
  5. Villain Payload
  6. Windows Defender Analysis Script

Scenario :

An adversary attempts to send a phishing email to technical support Employees of a XYZ company . One of the employees, who lacks cybersecurity knowledge, opens the email and downloads an attached file. The file is a password-protected ZIP archive. The employee manages to unzip the file and install or test the content within it. Meanwhile, the adversary gains access to the employee's company laptop. The adversary delivers a PowerShell script disguised as an executable (EXE) file. This script downloads a PowerShell script (PS1) from a cloud server into memory and executes it, bypassing detection by the employee and the default Windows security mechanisms. The PowerShell script is obfuscated to evade antivirus detection. Once the obfuscated script is running in memory, it gains access to the laptop and spams UAC (User Account Control) prompts to obtain administrative rights. After successfully bypassing UAC, the adversary gains full control over the system.

Important

ATT&CK Navigator File

Attack json file | download upload to ATT&CK Navigator for customization or for better view.

  • MITRE ATT&CK® MITRE ATT&CK®
  • The above attack can be improvised
  • Effort calculated:- 100 hours 🕙 in 2.5 months 📆 [on-going porject] Approximate value
  • Add delight to the experience when all tasks are completed

Warning

Simulated attacks in this project reveal potential vulnerabilities that adversaries might exploit, emphasizing the need for robust cybersecurity measures.

Caution

This project demonstrates sophisticated cyber-attacks, and its findings should be used responsibly to enhance defensive strategies and improve system security.

References

  1. scenario reference-01
  2. scenario reference-02
  3. MITRE ATT&CK®
  4. Attack-Naigator
  5. Windows 10/11 security update
Myself Vaishnavu C V

https://www.linkedin.com/in/vaishnavucv/

https://www.instagram.com/hack_with_vyshu/

About

Project build for joel and joshua students from Germany | course: Advanced Tactics in information security

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published