Building a Custom Attack
by Coleman Kane
LAB02: Building a Custom Attack
Recreate the attack that I demonstrated in the video Tuesday, and successfully compromise the Windows 7 VM. At the completion of this, you will not want to discard the Windows 7 VM. Instead, you will want to save a snapshot of the VM after the exercise is completed, and give the snapshot a descriptive name. Screenshot the snapshot view for the Windows 7 VM, and include that screenshot in the ZIP you’ll upload to the system.
You will make the following modifications to the attack:
- Choose a different file name for the EXE file
- Choose a different file name for the ACE file
- Still use
getsystem
andsessions -i
to single out the new session - Use the
download
module to download one or more files from the host (feel free to pre-populate some documents before you compromise the Win7 VM) - Use the
upload
module to upload a copy of the backdoor to another Windows-system-specific directory - (one of two ways) (a) Use the
persistence
command, and choose one of the options, to make sure the malware gets executed even if the copy in the StartUp folder is deleted. You may need to try multiple variants, and also there might be some delay or some user action that needs to occur to trigger it. (b) Alternately use one of the mechanisms described here, via a shell or other mechanism: https://pentestlab.blog/2019/10/01/persistence-registry-run-keys/ - Demonstrate this occurring by rebooting the Win7 VM and screenshotting the Pupysh session when the backdoor connects and is reported in the shell
Remember: Don’t immediately restore the VM back to the last saved state. Instead, save the machine state and then take a snapshot.
Submit to the assignment in Canvas a ZIP file, encrypted with password “cs6038”, containing the following:
- Your ACE archive
- Your screenshot of the snapshot view after snapshotting the VM at the completion of the exercise
- Your screenshot of the successful connection to Pupysh after rebooting the VM
- Write up documenting how you accomplished each of the steps above, and include as a PDF or document