Windows Library Files
Start WebDAV server
Use vscode and anme name it
config.Library-ms
Paste the code and chagne the url to attacker IP
Use this comand to get and execute powercat reverse shell by creating Shortcut file with name
automatic_configuration
If we expect that our victims are tech-savvy enough to actually check where the shortcut files are pointing, we can use a handy trick. Since our provided command looks very suspicious, we could just put a delimiter and benign command behind it to push the malicious command out of the visible area in the file's property menu. If a user were to check the shortcut, they would only see the benign command.
On our Kali machine, let's start a Python3 web server on port 8000 where powercat.ps1 is located and start a Netcat listener on port 4444.
Instead of using a Python3 web server to serve Powercat, we could also host it on the WebDAV share. However, as our WebDAV share is writable, AV and other security solutions could remove or quarantine our payload. If we configure the WebDAV share as read-only, we'd lose a great method of transferring files from target systems. Throughout this course, we'll use a Python3 web server to serve our payload for attacks utilizing Windows Library files.
To make it seems genuine we can write something to make the user click the file.
Transfer through SMBclient
Send through SMTP or Mail using [[Swaks]]
Last updated
Was this helpful?