№4. RedTeam-Tools. “Persistent” tools

15 May 2023 3 minutes Author: Lady Liberty

RedTeam’s four “perseverant” tools

Let’s get to know them briefly. Empire is a post-exploitation framework that allows you to generate useful data to establish remote connections to victim systems. Empire is a post-exploitation framework that allows you to generate useful data and establish remote connections to live systems. SharPersist. A Windows storage toolkit written in C#. Impacket provides a set of low-level Python bindings for various network protocols, including SMB, Kerberos, and LDAP, as well as higher-level libraries for interacting with network services and performing specific tasks such as dumping password hashes and creating network shares. When implemented correctly, a red team will launch a full-scale attack on your networks using all the tools and techniques used by hackers. Among others, this includes: Application Penetration Testing – aimed at detecting application-level flaws such as cross-site request forgery, data entry flaws, weak session management, and many others. Network Penetration Testing – Aims to detect network and system-level flaws, including misconfigurations, wireless network vulnerabilities, unauthorized services, and more. Physical penetration testing – testing the effectiveness and strengths and weaknesses of physical security controls in real life.

Social engineering is aimed at exploiting people’s weaknesses and human nature, testing people’s susceptibility to deception, persuasion and manipulation through phishing emails, phone calls and text messages, as well as physical contact on the spot. All of the above are components of redtiming. It’s a full-scale, multi-layered attack simulation designed to determine how well your people, networks, applications, and physical security controls can withstand an attack by a real attacker.

Impacket

Impacket provides a set of low-level Python bindings for various network protocols, including SMB, Kerberos, and LDAP, as well as higher-level libraries for interacting with network services and performing specific tasks such as dumping password hashes and creating network shares. It also includes a number of command-line tools that can be used to perform a variety of tasks, such as dumping SAM databases, enumerating trusted domains, and cracking Windows passwords.

Installation:



Using:





Empire

Empire is a post-exploitation framework that allows you to generate useful data and establish remote connections to live systems. Once the payload is executed on the victim system, it establishes a connection back to the Empire server, which can then be used to issue commands and control the target system. Empire also includes a number of built-in modules and scripts that can be used to perform certain tasks, such as resetting password hashes, accessing the Windows registry, and stealing data.

Installation:



Using:





SharPersist

A Windows storage toolkit written in C#.

The project has a wiki.


Click here

Installation: (binary)


Click here

Using:





Ligolo-ng

Ligolo-ng is a simple, lightweight, and fast tool that allows pentesters to establish tunnels from a TCP/TLS reverse connection using the tun interface (without the need for SOCKS). Instead of using a SOCKS proxy or TCP/UDP forwarding, Ligolo-ng creates a user network stack using​​ ​​Gvisor .During relay/proxy operation, the tun interface is used, packets sent to this interface are broadcast, and then transmitted to the agen t’s remote network.

Installation (download):

Precompiled binaries (Windows/Linux/macOS) are available on the release page.


Click here

Installation (assembly):



Settings: (Linux)



Settings: (Windows)

You need to download the driver for Wintun (used by WireGuard ) and put its wintun.dll in the same folder as Ligolo (make sure you are using the correct architecture).

Settings: (proxy server)



Using:

Run the agent on the target (victim) computer (no rights required!):



A session should appear on the proxy server.



Use the session command to select an agent.





Found an error?
If you find an error, take a screenshot and send it to the bot.