Red Team Diary, Entry #3: Custom Malware Development (Establishing A Shell Through the Target’s Browser)

https://gist.github.com/anonymous/09f10cdb5d9b0bae4755850273083fd2
https://gist.github.com/anonymous/a1befcd2a0acf8fed62aa854e05e0d88

The attack in action…

Once the target executes the AutoIt-derived executable, port 4444 will be bound on his machine and a hidden browser will load a web page with BeEF running underneath. Now, to send the attack’s stage payload using BeEF perform the following:

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store