Search the Community
Showing results for tags 'engagements'.
-
Sandman is a NTP based backdoor for red team engagements in hardened networks. Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an arbitrary shellcode from a pre-defined server. Since NTP is a protocol that is overlooked by many defenders resulting in wide network accessibility. [Hidden Content]
-
Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an arbitrary shellcode from a pre defined server. Since NTP is a protocol that is overlooked by many defenders resulting in wide network accessibility. Capabilities Getting and executing an arbitrary payload from an attacker’s controlled server. Can work on hardened networks since NTP is usually allowed in FW. Impersonating a legitimate NTP server via IP spoofing. Setup SandmanServer (Setup) Python 3.9 Requirements are specified in the requirements file. [hide][Hidden Content]]
-
OffensiveRust My experiments in weaponizing Rust for implant development and general offensive operations. Why Rust? It is faster than languages like C/C++ It is a multi-purpose language, bearing excellent communities It has an amazing inbuilt dependency build management called Cargo It is LLVM based which makes it a very good candidate for bypassing static AV detection Super easy cross-compilation to Windows from *nix/MacOS only requires you to install the mingw toolchain, although certain libraries cannot be compiled successfully in other OSes. [hide][Hidden Content]]