on-Microsoft-teams-Reverse-shell-Password-stealer

所属分类:C/C++基础
开发工具:PowerShell
文件大小:0KB
下载次数:0
上传日期:2023-02-03 14:33:52
上 传 者sh-1993
说明:  通过执行进程注入和dll代理Reverse shell、密码窃取器、jupyter笔记本、令牌嗅探器、基于我的加密算法的勒索软件,在Microsoft团队上使用漏洞进行权限提升
(Privilege escalation using vulnerability on Microsoft teams by doing process injection and dll proxing Reverse shell, Password stealer, jupyter notebook, token sniffer, ransomware based on my encryption algorithm)

文件列表:
Dll1/ (0, 2023-02-03)
Dll1/Dll1.sln (1433, 2023-02-03)
Dll1/Dll1/ (0, 2023-02-03)
Dll1/Dll1/Dll1.vcxproj (8722, 2023-02-03)
Dll1/Dll1/Dll1.vcxproj.filters (1283, 2023-02-03)
Dll1/Dll1/Dll1.vcxproj.user (168, 2023-02-03)
Dll1/Dll1/dllmain.cpp (4031, 2023-02-03)
Dll1/Dll1/framework.h (154, 2023-02-03)
Dll1/Dll1/pch.cpp (191, 2023-02-03)
Dll1/Dll1/pch.h (576, 2023-02-03)
Dll1/Dll1/x64/ (0, 2023-02-03)
Dll1/Dll1/x64/Release/ (0, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.dll.recipe (275, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.iobj (287404, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.ipdb (90288, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.log (387, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.pch (7929856, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/ (0, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/CL.command.1.tlog (1486, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/CL.read.1.tlog (61862, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/CL.write.1.tlog (516, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/Dll1.lastbuildstate (143, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/Dll1.write.1u.tlog (202, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/link.command.1.tlog (1204, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/link.read.1.tlog (4464, 2023-02-03)
Dll1/Dll1/x64/Release/Dll1.tlog/link.write.1.tlog (458, 2023-02-03)
Dll1/Dll1/x64/Release/dllmain.obj (1156962, 2023-02-03)
Dll1/Dll1/x64/Release/pch.obj (208443, 2023-02-03)
Dll1/Dll1/x64/Release/vc142.pdb (897024, 2023-02-03)
Dll1/x64/ (0, 2023-02-03)
Dll1/x64/Release/ (0, 2023-02-03)
Dll1/x64/Release/Dll1.dll (107520, 2023-02-03)
Dll1/x64/Release/Dll1.exp (3699, 2023-02-03)
Dll1/x64/Release/Dll1.lib (5168, 2023-02-03)
Dll1/x64/Release/Dll1.pdb (5099520, 2023-02-03)
GeneratePayload.py (2752, 2023-02-03)
PythonAttckerSideTools/ (0, 2023-02-03)
PythonAttckerSideTools/ChromePass.py (2141, 2023-02-03)
PythonAttckerSideTools/DumpWithMimi.py (2087, 2023-02-03)
PythonAttckerSideTools/PayloadGenerator.py (3841, 2023-02-03)
... ...

# Hacking Microsoft Teams to Elevate Privileges, Perform Reverse Shell Attack, Steal Passwords, and Achieve Persistence Through a Vulnerability Exploiting a vulnerability that i have discovered in Microsoft Teams that allows for privilege escalation through process injection and DLL proxying. By exploiting this vulnerability, an attacker can gain unauthorized access to sensitive information and execute a variety of malicious actions on the compromised system. # These actions include: - A reverse shell - A password stealer - A Jupyter notebook token sniffer - Ransomware based on my custom encryption algorithm - Persistence - Stenography In addition, the program has the capability to run hacking tools developed in Python using a Jupyter notebook, including a token sniffer shared through ngrok. This --allows the attacker to remotely access the compromised system and perform additional malicious actions. The program is also able to bypass UAC and extract all stored credentials and passwords, including browser passwords, WiFi passwords, and Windows passwords, by dumping LSASS and SAM. This allows the attacker to gain access to a wide range of sensitive information stored on the system. To ensure that the program goes undetected, it employs advanced techniques to hide the attack's tracks. The shell is completely hidden using stenography, which involves hiding the bytes of the shell script behind the pixels of an image. This is achieved through the use of invoke-psimage, which generates a command line to extract the relevant bytes when the Trojan DLL is loaded by Microsoft Teams. The Trojan DLL also includes forwarders for all original functions of the original DLL, ensuring that the program does not crash when Microsoft Teams attempts to use these functions. To run the program and generate the full payload, download the repository, run the file named 'GeneratePayload.py', and follow the instructions.

近期下载者

相关文件


收藏者