Skip to content

Latest commit

 

History

History
70 lines (49 loc) · 4.83 KB

README.md

File metadata and controls

70 lines (49 loc) · 4.83 KB

Project-winEvasion-Redteam

This Project is build for Joyel and Joshua Master Applied Computer Science (MACS) students from Hochschule Schmalkalden - University of Applied Sciences Germany

Course: Advanced Tactics in Information Security

Note

This project integrates the MITRE ATT&CK framework with advanced red team tactics to identify and exploit security vulnerabilities in Windows systems.

Tip

Use PowerShell scripts with advanced obfuscation techniques to create Fully Undetectable (FUD) payloads that can bypass Windows Defender.

Important

Regular updates to FUD payloads are necessary to keep up with the latest Windows security features and ensure continued effectiveness.

Attack - EVENT TIME LINE

Att&ck Time Line

Attack and C2 Setup

  1. Ubuntu Server Configuration for C2 and Mail Server
  2. Powershell Script to Payload.exe
  3. Python Script for Sending Mail with Payload.exe
  4. Metasploit Payload Generating
  5. Villain Payload
  6. Windows Defender Analysis Script

Scenario :

An adversary attempts to send a phishing email to technical support Employees of a XYZ company . One of the employees, who lacks cybersecurity knowledge, opens the email and downloads an attached file. The file is a password-protected ZIP archive. The employee manages to unzip the file and install or test the content within it. Meanwhile, the adversary gains access to the employee's company laptop. The adversary delivers a PowerShell script disguised as an executable (EXE) file. This script downloads a PowerShell script (PS1) from a cloud server into memory and executes it, bypassing detection by the employee and the default Windows security mechanisms. The PowerShell script is obfuscated to evade antivirus detection. Once the obfuscated script is running in memory, it gains access to the laptop and spams UAC (User Account Control) prompts to obtain administrative rights. After successfully bypassing UAC, the adversary gains full control over the system.

Important

ATT&CK Navigator File

Attack json file | download upload to ATT&CK Navigator for customization or for better view.

  • MITRE ATT&CK® MITRE ATT&CK®
  • The above attack can be improvised
  • Effort calculated:- 100 hours 🕙 in 2.5 months 📆 [on-going porject] Approximate value
  • Add delight to the experience when all tasks are completed

Warning

Simulated attacks in this project reveal potential vulnerabilities that adversaries might exploit, emphasizing the need for robust cybersecurity measures.

Caution

This project demonstrates sophisticated cyber-attacks, and its findings should be used responsibly to enhance defensive strategies and improve system security.

References

  1. scenario reference-01
  2. scenario reference-02
  3. MITRE ATT&CK®
  4. Attack-Naigator
  5. Windows 10/11 security update
Myself Vaishnavu C V

https://www.linkedin.com/in/vaishnavucv/

https://www.instagram.com/hack_with_vyshu/