The Real Hugo
Enumeration
Containers
Docs
Network_scanners
Windows
Exploit
CPUs
Binaries
Dns
Hashes
Imagemagick
Java
Level3_hypervisor
Linux
MacOS
Network
Padding
Python
Samba
Sqli
Ssl_tls
Web
Windows
Portable Executables
Dll_hijacking
Docs
Macros
Payloads
Print_nightmare
Process_injection
Service_escalation
Zero_logon
Yaml
Forensics
Hashes
Persistence
Post exploitation
Seatbelt
Bc_security
Docs
- pivoting
Priv_esc
Docs
Kernel-exploits
Privesc-scripts
Suid
Reverse engineering
Reverse shells
Command and Control
Domain Fronting
- Use a Domain on the C2 server
- User Cloudflare to proxy the request and responses to and from the target
- Use HTTPs for channel encryption
Profiles
- Server evaluates by custom user-agents to identify agents
Types
- Std listener, TCP or UDP
- HTTP/HTTPS, counter FW
- DNS, if internet access of the target is flaky
- SMB, counter network segments
Redirector
- Apache or nginx as reverse proxy in front of the c2 server
- FW is still needed in front of the redirector
- These get burned instead of the c2