- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 369字
- 2021-08-13 15:36:42
Payloads
A payload is a piece of code that is delivered to the target system or an application via an exploit to perform an act of our choice. Payloads can actually be divided into three main types: singles, stagers, and stages. These can be defined as follows:
- Singles: These payloads are standalone and are usually used to perform simple tasks, such as opening notepad.exe, adding a user, and so on.
- Stagers: This sets up a connection between the two systems, and then stages are downloaded by them to the victim's machine.
- Stages: These can be considered as a component of a payload, which provides different features and does not need to have a size limit. An example of this is Meterpreter.
As well as these, the other types of payloads are as follows:
- Inline (non-staged): This is a single exploit containing the full shellcode to perform a specific task.
- Stager: This works along with stage payloads to perform a specific task. The stager establishes a communication channel between the attacker and the victim and sends a stage payload to execute on the remote host.
- Meterpreter: This operates through DLL injection, is loaded in the memory, and leaves no traces on HDD.
- PassiveX: This uses ActiveX control to create a hidden instance of Internet Explorer. Using this, it communicates with the attacker via HTTP requests and responses.
- NoNX: This is used to bypass DEP protection.
- Ord: These are extremely small sized payloads that work on all versions of Windows. However, they are unstable and rely on ws2_32.dll to be loaded in the exploitation process.
- IPv6: This is built to work on IPv6 hosts.
- Reflective DLL injection: This was created by Stephen Fewer, and is a technique that consists of a stage payload being injected into a compromised host process running in-memory and never touching the host hard drive.
To view a complete list of payloads, we can use the show payloads command:
From the preceding command, we can see that we have different kinds of payloads for all platforms. The most commonly used of these is as follows:
meterpreter/reverse_tcp .
However, in a red-team activity, this payload is not recommended. We will read more about this in further chapters.
推薦閱讀
- SignalR Realtime Application Cookbook
- Axure RP8入門手冊:網站和App原型設計從入門到精通
- 黑客大曝光:Web應用程序安全(原書第3版)
- Cisco Unified Communications Manager 8:Expert Administration Cookbook
- 網絡基礎
- 網絡設備配置與管理
- CSS新世界
- 深度學習:主流框架和編程實戰
- 信息安全導論
- Instant PageSpeed Optimization
- 基于物聯網的數字社區關鍵技術及應用
- Linux環境編程
- 劍指云端:引領企業IT未來的最佳實踐
- 多云和混合云:云原生多集群和應用管理
- ASP動態網站設計完整實例詳解