Abstract We want to run a simple C2 that is not exposed to the internet, with multiple socats redirecting our payload delivery and session handling correctly. All this with the help of Docker. It’s straightforward once you’ve gotten the grip. Why Using containers means we get the “it always works” …
Read More »Post Exploitation Hacking Techniques
we’ll talk about post exploitation hacking techniques you can use after having a meterpreter shell on a remote system. You’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don’t take this guide as standard methodology. The purpose is to show different “tips and tricks” you …
Read More »exploit windows PC using eternalblue smb remote windows kernel pool corruption
This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv! SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool …
Read More »