Phishing for Access (Requires MailSVR)
Preparation
On Kali Machine:
Create a webshare for target machines to send files to
/home/kali/.local/bin/wsgidav --host=0.0.0.0 --port=80 --auth=anonymous --root /home/kali/beyond/webdav/
OR
wsgidav -H 0.0.0.0 -p 80 --auth anonymous -r /home/kali/beyond/webdav/
Create a text file named body.txt
Input the following email template into the text file
On Windows Machine:
Create a text file named: config.Library-ms
Input the following xml snippet below into the text file
Create a shortcut that runs the following powershell command that initiates a reverse shell
Transfer both files onto the Kali Machine for hostingExploit
Goal: Target user receive the email, and and executes the .library-ms file. Upon execution, the target machine will fetch the Powercat binary from our Kali machine, and initiate a reverse shell with us. Giving us initial foothold onto the target machine
Last updated