Skip to content
This repository was archived by the owner on Jan 5, 2024. It is now read-only.

8erg/ModularRat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 _ __ ___   ___   __| |_   _| | __ _ _ __   _ __ __ _| |_
| '_ ` _ \ / _ \ / _` | | | | |/ _` | '__| | '__/ _` | __|
| | | | | | (_) | (_| | |_| | | (_| | |    | | | (_| | |_
|_| |_| |_|\___/ \__,_|\__,_|_|\__,_|_|    |_|  \__,_|\__|

Created by : he$einb3rg
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Architecture

alt text

How It Works

The attacker is connected to the command and control server through ssh. The command and control server contains all the modules that will be uploaded on the victim machine. In my case my command and control server represents my raspberrypi that runs an uploadserver given to me by python, so i can expose and download the files from the machine to another or I can upload file from a remote machine to my command and control center. Your command and control server could be an amazon instance, or a vm, or another machine. There is an initial program that will be executed on the victim machine, you can use any means necessary to get the program to execute himself on the victim

How To Use

There is an initial program that will be executed on the victim machine, you can use any means necessary to get the program to execute himself on the victim. Afterwards, all the modules will get downloaded on the victim machine et you well get a reverse shell connection back to the C2 and from there you will be able to execute the modules.

Steps

  • Make an ssh connection to your command and control center
  • Move into your ModularRat folder and start your uploadserver on you c2 : python3 -m uploadserver
  • Start a second ssh connection to your command and control center
  • Start a netcat listener
  • Find a way to execute the phase1.cmd program on the victim machine (for the demo we will drag and drop only)
    • Spear Phishing
    • Social Engineering
  • Enjoy...;)

References

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published