Red Teaming 101 - Establishing Persistence with Havoc C2 and SharPersist

Поділитися
Вставка
  • Опубліковано 31 гру 2024

КОМЕНТАРІ • 15

  • @richardghani5458
    @richardghani5458 6 місяців тому +1

    Absolutely underrated video. Straight to the point video no bs! Thank you .

  • @flyforsomething
    @flyforsomething Рік тому

    Very useful! Great video

  • @reptarmc
    @reptarmc Рік тому

    Great work. Thank you for sharing!

  • @EnLopXf
    @EnLopXf Рік тому

    Thank you for malware development tutorial,

  • @LEKIPE1
    @LEKIPE1 11 днів тому

    Does someone know how to automatically run a powershell command on Havoc once the PC is infected?

    • @Lsecqt
      @Lsecqt  11 днів тому

      A lot of ways but havoc do not support powershell you need to use powershell to stage the download and execution phase

  • @eliaslobo7467
    @eliaslobo7467 4 місяці тому

    Thanks for the tutorial, I did everything, I get the message "SUCCESS: Registry persistence added" but when I restart Windows there is no connection with the agent help

    • @Lsecqt
      @Lsecqt  4 місяці тому +1

      You can join the red teaming army discord, and share your issue there. Make sure to include screenshots

  • @richardghani5458
    @richardghani5458 6 місяців тому

    How can i hide the cmd pop up after establishing persistence? I supopose that is from the sharppersist exe.

    • @Lsecqt
      @Lsecqt  6 місяців тому +1

      You can tweak your code to not spawn anything, you can see its usage here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp

  • @firosiam7786
    @firosiam7786 Рік тому

    But dll injection to work sometimes I think the dll we make should be exactly similar to a legitimate dll of any program that is using that dll for that dll to properly work right . If a dll we craft is not revealing the original dll that should be there then it would fail to load and execute out payload right

    • @Lsecqt
      @Lsecqt  Рік тому

      You are mistaking DLL Injection for DLL Hijacking / Sideloading, see the differences here: ua-cam.com/video/KhVxglO2mcM/v-deo.html

  • @thefunnychannel6640
    @thefunnychannel6640 2 місяці тому

    how to do it without cmd pop up beacuse i dont want other party to see it

    • @Lsecqt
      @Lsecqt  2 місяці тому

      You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp