官术网_书友最值得收藏!

Terminology

Before getting into the details of all the options used in this tool, let's first take a look at the terminologies of the tool:

  • Zombies:

The compromised system that connects back to the Koadic Command and Control Server. Just like a session is opened in Metasploit, a zombie will connect back to Koadic.

  • Stagers:

The Command and Control web server from where the payload and implants are fetched by the zombie. Stagers are also used to maintain the connection between the zombies and Koadic. Note that Koadic does not rely on TCP connections for continues communication. Instead, the connection is maintained by requesting multiple HTTP connections.

  • Implants:

An implant is a JavaScript or a VBScript code, which is executed by zombies to perform a certain task. It's the same as the post modules in Metasploit. Once an implant is chosen to be used by Koadic, the script is sent over to the zombies and is executed on the system. The fetched results are then displayed on the Koadic C2 panel.

In Koadic, the implants are categorized as follows: pivot, persistence, manage, utils, elevate, gather, scan, fun, and inject.

  • Jobs:

Whenever the stager (C2) executes an implant (post module) over to the zombie (compromised system), a job is created in this process by C2. C2 gives the job execute the implant to the zombies and once the job is completed, C2 is notified about the completion (also displayed on the C2 panel).

To start with this tool, we can start by first executing a help command or we can use a ? instead:

? 

The ? command will show all the commands that are supported by the Koadic C2 with their respective descriptions.

To use Koadic, we can follow the given stages for performing a Koadic-style post-exploitation:

  1. Stager Establishment: Set up the stager web server where the zombie will get connected.
  2. Payload Execution: Drop the payload over to the target server and execute the payload to get the zombie hooked up by Koadic.
  3. Running Implants: Execute the implants to get domain information, SYSTEM access, and NTLM hashes. These can be used for further post-exploitation.
  4. Pivoting: Hook the zombie and move around the network through it.
主站蜘蛛池模板: 米易县| 吉林市| 金阳县| 夏河县| 遂宁市| 克山县| 油尖旺区| 白城市| 晋宁县| 永城市| 民县| 岳西县| 临夏县| 繁昌县| 万盛区| 牡丹江市| 丰宁| 孝昌县| 宽城| 常熟市| 德令哈市| 上杭县| 常德市| 左贡县| 汉沽区| 黄平县| 甘洛县| 沅江市| 枞阳县| 瓮安县| 泗水县| 庆云县| 临邑县| 调兵山市| 抚州市| 五大连池市| 黄冈市| 沈阳市| 辛集市| 娄底市| 孝感市|