|
|
@@ -0,0 +1,25 @@
|
|
|
+Shareable is a proof of concept executable that allows an attacker to run a hosted shellcode file from a shared network folder.
|
|
|
+
|
|
|
+Execution:
|
|
|
+
|
|
|
+Here we have a raw Havoc shellcode file renamed to reflect a TXT file located on a shared network folder accessible to the domain controller.
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+On our POC, we enter the folder/file location and hostname.
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+We then compile x86_64-w64-mingw32-g++ -o smbex.exe smb.cpp -lws2_32 -lntdll
|
|
|
+
|
|
|
+We upload the executable to the domain controller and execute.
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+And we get a Havoc beacon back.
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+Considerations:
|
|
|
+
|
|
|
+This POC uses userland WinAPIs. There have been zero OPSEC considerations in this POC. If you consider using this, modify it to use syscalls. You will also notice that the memory allocation is marked by EXECUTE_READWRITE. Modify it to use READ_WRITE then EXECUTE_READ for better OPSEC. Add sleep functions, payload encryption, ect.
|