Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Redpill - Assist Reverse Tcp Shells In Post-Exploration Tasks

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Redpill - Assist Reverse Tcp Shells In Post-Exploration Tasks


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Project Description

The redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements we
need to use unconventional ways to access target system, such as reverse tcp shells (not metasploit) in order
to bypass the defenses implemented by the system administrator. After the first stage was successful compleated
we face another type of problems: "I have (shell) access to the target system, and now what can I do with it?"

This project consists of several PowerShell scripts that perform different post-exploitation functions and the
main script redpill.ps1 that is main work its to download/config/exe the scripts contained in this repository.

The goal is to have a similar meterpreter experience in our reverse tcp shell prompt (meterpreter similar options)


Folder Name Description Notes
Bin Contains redpill main modules Sysinfo | GetConnections | Persiste | Keylogger | etc.
Bypass Contains redpill bypass scripts Manual Download/Execution required
modules Contains redpill modules Sherlock | CredsPhish | Webserver | StartWebServer | etc.
Utils Contains BAT | PS1 scripts Manual execution required

CmdLet Parameters syntax\examples
post-exploitation module. venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be easily accessible in our reverse tcp shell ( shell prompt ). ">
 This cmdlet belongs to the structure of venom v1.0.17.8 as a post-exploitation module.
venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be
easily accessible in our reverse tcp shell ( shell prompt ).

To List All Parameters Available, execute in powershell prompt:

.\redpill.ps1 -Help Parameters

CmdLet Parameter Name Parameter Arguments Description
-SysInfo Enum | Verbose Quick System Info OR Verbose Enumeration
-GetConnections Enum | Verbose Enumerate Remote Host Active TCP Connections
-GetDnsCache Enum | Clear Enumerate\Clear remote host DNS cache entrys
-GetInstalled Enum Enumerate Remote Host Applications Installed
-GetProcess Enum | Kill | Tokens Enumerate OR Kill Remote Host Running Process(s)
-GetTasks Enum | Create | Delete Enumerate\Create\Delete Remote Host Running Tasks
-GetLogs Enum | Verbose | Clear Enumerate eventvwr logs OR Clear All event logs
-GetBrowsers Enum | Verbose | Creds Enumerate Installed Browsers and Versions OR Verbose
-Screenshot 1 Capture 1 Desktop Screenshot and Store it on %TMP%
-Camera Enum | Snap Enum computer webcams OR capture default webcam snapshot
-StartWebServer Python | Powershell Downloads webserver to %TMP% and executes the WebServer
-Keylogger Start | Stop Start OR Stop recording remote host keystrokes
-MouseLogger Start Capture Screenshots of Mouse Clicks for 10 seconds
-PhishCreds Start | Brute Promp current user for a valid credential and leak captures
-GetPasswords Enum | Dump Enumerate passwords of diferent locations {Store|Regedit|Disk}
-WifiPasswords Dump | ZipDump Enum Available SSIDs OR ZipDump All Wifi passwords
-EOP Enum | Verbose Find Missing Software Patchs for Privilege Escalation
-ADS Enum | Create | Exec | Clear Hidde scripts { bat | ps1 | exe } on $DATA records (ADS)
-BruteZip $Env:TMP\archive.zip Brute force sellected Zip archive with the help of 7z.exe
-Upload script.ps1 Upload script.ps1 from attacker apache2 webroot
-Persiste $Env:TMP\Script.ps1 Persiste script.ps1 on every startup {BeaconHome}
-CleanTracks Clear | Paranoid Clean disk artifacts left behind {clean system tracks}
-AppLocker Enum | WhoAmi | TestBat Enumerate AppLocker Directorys with weak permissions
-FileMace $Env:TMP\test.txt Change File Mace {CreationTime,LastAccessTime,LastWriteTime}
-MetaData $Env:TMP\test.exe Display files \ applications description (metadata)
-PEHollow GetSystem | $Env:TMP\test.exe Process Hollowing {impersonate explorer.exe as parent}
-MsgBox "Hello World." Spawns "Hello World." msgBox on local host {wscriptComObject}
-SpeakPrank "Hello World." Make remote host speak user input sentence {prank}
-NetTrace Enum Agressive Enumeration with the help of netsh {native}
-PingSweep Enum | Verbose Enumerate Active IP Address and open ports on Local Lan
-DnsSpoof Enum | Redirect | Clear Redirect Domain Names to our Phishing IP address
-DisableAV Query | Start | Stop Disable Windows Defender Service (WinDefend)
-HiddenUser Query | Create | Delete Query \ Create \ Delete Hidden User Accounts
-CsOnTheFly Compile | Execute Download \ Compile (to exe) and Execute CS scripts
-CookieHijack Dump|History Edge|Chrome Cookie Hijacking tool
-UacMe Bypass | Elevate | Clean UAC bypass|EOP by dll reflection! (cmstp.exe)

To Display Detailed information about each parameter execute:

Syntax : .\redpill.ps1 -Help [ -Parameter Name ]
Example: .\redpill.ps1 -Help WifiPasswords



Instructions how to use the Cmdlet {Local tests}
 This cmdlet belongs to the structure of venom v1.0.17.8 as a post-exploitation module.
venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be
easily accessible in our reverse tcp shell ( shell ).

'this section describes how to test this Cmdlet Locally without exploiting target host'

1ยบ - Download CmdLet from GitHub repository to 'Local Disk'

iwr -Uri https://raw.githubusercontent.com/r00t-3xp10it/redpill/main/redpill.ps1 -OutFile redpill.ps1

2ยบ - Set Powershell Execution Policy to 'UnRestricted'

Set-ExecutionPolicy UnRestricted -Scope CurrentUser

ย 


3ยบ - Browse to 'redpill.ps1' storage directory

cd C:\Users\pedro\Desktop



4ยบ - Access CmdLet Help Menu {All Parameters}

.\redpill.ps1 -Help Parameters



5ยบ - Access [ -WifiPasswords ] Detailed Parameder Help

Syntax : .\redpill.ps1 -Help [ -Parameter Name ]
Example: .\redpill.ps1 -Help WifiPasswords



ย 

6ยบ - Running [ -WifiPasswords ] [ Dump ] Module

Syntax : .\redpill.ps1 [ -Parameter Name ] [ @argument ]
Example: .\redpill.ps1 -WifiPasswords Dump



7ยบ - Running [ -sysinfo ] [ Enum ] Module

Syntax : .\redpill.ps1 [ -Parameter Name ] [ @argument ]
Example: .\redpill.ps1 -sysinfo Enum



Instructions how to use the CmdLet under Venon v1.0.17.8
 This cmdlet belongs to the structure of venom v1.0.17.8 as a post-exploitation module.
venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be
easily accessible in our reverse tcp shell ( shell prompt ).

1ยบ - execute in reverse tcp shell prompt

[SKYNET] C:\Users\pedro\AppData\Local\Temp> powershell -File redpill.ps1 -Help Parameters



2ยบ - Access [ -WifiPasswords ] Detailed Parameter Help

[SKYNET] C:\Users\pedro\AppData\Local\Temp> powershell -File redpill.ps1 -Help WifiPasswords



3ยบ - Running [ -WifiPasswords ] [ Dump ] Module

[SKYNET] C:\Users\pedro\AppData\Local\Temp> powershell -File redpill.ps1 -WifiPasswords Dump



To Manual download the CmdLet for Local Tests, execute:
iwr -Uri https://raw.githubusercontent.com/r00t-3xp10it/redpill/main/redpill.ps1 -OutFile redpill.ps1


Video Tutorials



Demonstration - This tutorial uses: sysinfo, GetPasswords, UacMe modules
MouseLogger - Capture Screenshots of 'MouseClicks' with the help of psr.exe
PhishCreds - Phish for login credentials OR Brute Force user account password
FileMace - Change File TimeStamp {CreationTime, LastAccessTime, LastWriteTime}
CsOnTheFly - Download (from url), Auto-Compile and Execute CS scripts On-The-Fly!
EOP - Find missing software patchs for privilege escalation


Acknowledgments
hax0r Function OS Flavor
@youhacker55 For All the help Debugging this cmdlet (Testing BETA version) Windows 7 x64bits
@0xyg3n For All the help Debugging this cmdlet (Testing BETA version) Windows 10 x64bits
@Shanty_Damayanti Debugging this cmdlet (amsi string detection bypasses) Windows 10 x64bits
@miltinhoc Debugging this cmdlet and recording video tutorials Windows 10 x64bits







Any collaborations Or bugreports are wellcome


SuspiciousShellActivity - RedTeam @2021


...



๐Ÿ“Œ Redpill me on CloverOs


๐Ÿ“ˆ 35.32 Punkte

๐Ÿ“Œ [shellcode] Linux/ARM (Raspberry Pi) - Reverse TCP Shell (192.168.0.12:4444/TCP) Shellcode (160 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP Shell (127.1.1.1:8888/TCP) Shellcode (69 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86 - Reverse TCP /bin/sh Shell (127.1.1.1:8888/TCP) Null-Free Shellcode (67/69 b [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shellcode (79 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shellcode (79 byte [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (136 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86-64 - Reverse TCP (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hell) Shell [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86-64 - Reverse TCP (192.168.1.9:4444/TCP) Shell (/bin/sh) + Password (doomedra) [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes) [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellc [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (www.netric.org:45295/TCP) Shell (/bin/sh) Shellcode (131 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:55555/TCP) Shell Shellcode (72 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:1337/TCP) Shell Shellcode (74 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:12345/TCP) cat /etc/passwd Shellcode (111 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Windows/x86 (2000) - Reverse TCP (192.168.0.247:8721/TCP) Connect + Vampiric Import Shellcode (179 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password (MyPasswd) + Null-Free Shellcode (156 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password (MyPasswd) + [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) Null Free Shellcode (80 [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) Null Free Shellcode (80 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x64 - Reverse TCP (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (1234567) Shellcode (104 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (5555/TCP) Shellcode - (73 Bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86 - Reverse TCP (127.0.0.1:4444/TCP) #Shell #Shellcode (96 Bytes) [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (127.0.0.1:4444/TCP) Shell Shellcode (96 Bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Reverse TCP (::FFFF:192.168.1.5:4444/TCP) Shell (/bin/sh) + Null-Free + IPv6 Shellcode (86 bytes)


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86 - Reverse TCP (::FFFF:192.168.1.5:4444/TCP) Shell (/bin/sh) + Null-Free + IPv [#0day #Exploit]


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ Linux/x86 Reverse TCP (::FFFF:192.168.1.5:4444/TCP) Shell Shellcode


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ Hacking with Netcat part 2: Bind and reverse shells


๐Ÿ“ˆ 27.17 Punkte

๐Ÿ“Œ Hacking with Netcat part 2: Bind and reverse shells


๐Ÿ“ˆ 27.17 Punkte

๐Ÿ“Œ Escalating Privileges in Windows & Staged Reverse Shells - Hak5 2117


๐Ÿ“ˆ 27.17 Punkte

๐Ÿ“Œ Hacking with Netcat part 2: Bind and reverse shells


๐Ÿ“ˆ 27.17 Punkte











matomo