0x1 Posted January 15, 2019 Share Posted January 15, 2019 TrevorC2 - Command and Control via Legitimate Behavior over HTTP This is the hidden content, please Sign In or Sign Up TrevorC2 is a client/server model for masking command and control through a normally browsable website. Detection becomes much harder as time intervals are different and does not use POST requests for data exfil. There are two components to TrevorC2 - the client and the server. The client can be configured to be used with anything. In this example it's coded in Python but can easily be ported to C#, PowerShell, or whatever you want. Currently the trevorc2_client.py supports Windows, MacOS, and Linux. You can always byte compile the Windows one to get an executable, but preference would be to use Windows without having to drop an executable as a stager. The way that the server works is by tucking away a parameter thats right before the parameter. This is completely configurable, and it's recommended you configure everything to be unique in order to evade detection. Here is the workflow: This is the hidden content, please Sign In or Sign Up Add ability for longer than 2048 data output. Query string parameter length limited size length. Add do_POST support for POST exfil on longer data. Add upload/download functionality. More info & Download : This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts