官术网_书友最值得收藏!

  • Hands-On Red Team Tactics
  • Himanshu Sharma Harpreet Singh
  • 365字
  • 2021-08-13 15:36:39

Terminology

Before getting into the details of all the options used in this tool, let's first take a look at the terminologies of the tool:

  • Zombies:

The compromised system that connects back to the Koadic Command and Control Server. Just like a session is opened in Metasploit, a zombie will connect back to Koadic.

  • Stagers:

The Command and Control web server from where the payload and implants are fetched by the zombie. Stagers are also used to maintain the connection between the zombies and Koadic. Note that Koadic does not rely on TCP connections for continues communication. Instead, the connection is maintained by requesting multiple HTTP connections.

  • Implants:

An implant is a JavaScript or a VBScript code, which is executed by zombies to perform a certain task. It's the same as the post modules in Metasploit. Once an implant is chosen to be used by Koadic, the script is sent over to the zombies and is executed on the system. The fetched results are then displayed on the Koadic C2 panel.

In Koadic, the implants are categorized as follows: pivot, persistence, manage, utils, elevate, gather, scan, fun, and inject.

  • Jobs:

Whenever the stager (C2) executes an implant (post module) over to the zombie (compromised system), a job is created in this process by C2. C2 gives the job execute the implant to the zombies and once the job is completed, C2 is notified about the completion (also displayed on the C2 panel).

To start with this tool, we can start by first executing a help command or we can use a ? instead:

? 

The ? command will show all the commands that are supported by the Koadic C2 with their respective descriptions.

To use Koadic, we can follow the given stages for performing a Koadic-style post-exploitation:

  1. Stager Establishment: Set up the stager web server where the zombie will get connected.
  2. Payload Execution: Drop the payload over to the target server and execute the payload to get the zombie hooked up by Koadic.
  3. Running Implants: Execute the implants to get domain information, SYSTEM access, and NTLM hashes. These can be used for further post-exploitation.
  4. Pivoting: Hook the zombie and move around the network through it.
主站蜘蛛池模板: 新巴尔虎左旗| 辽阳县| 重庆市| 政和县| 道孚县| 江华| 同江市| 和林格尔县| 化州市| 孝昌县| 治县。| 莱阳市| 巢湖市| 怀安县| 镇巴县| 邵阳市| 长岭县| 德兴市| 淮安市| 清水县| 高要市| 无锡市| 潼南县| 定兴县| 苍梧县| 江华| 峡江县| 酉阳| 宜都市| 习水县| 云和县| 江油市| 天峨县| 崇文区| 六安市| 龙川县| 民勤县| 台中县| 台安县| 太湖县| 淮阳县|