Web Shells & Payloads
This Page will be specific for Web Shells, reverse and bind shells are discussed in other sections.
We'll dive deeper into metasploit and its details in a later note, but this section will give you a taste of different shells, use cases and considerations.
For reverse shells, consider having a look at this.
Web Shells
Considerations
Huge fingerprints left on the server since we're uploading files.
Limited interactivity with the target OS and shells will most likely have restricted and very few features.
Files might be deleted after a specific period of time.
We may want to remove the ascii art and comments when uploading the file as it may trigger alerts and AV.
Laudanum
A repo of pre-built injectable files for different web app languages including but not limited to: asp, aspx, jsp and php.
# Make a copy to not modify the original script.
$ cp <path-to-shell.aspx> <target-path>
And then proceed by modifying the necessary lines and fields in the file to specify the target ip, port ...etc
Active Server Page Extended (ASPX) is a file type/extension written for Microsoft's ASP.NET Framework. On a web server running the ASP.NET framework, web form pages can be generated for users to input data. On the server side, the information will be converted into HTML. We can take advantage of this by using an ASPX-based web shell to control the underlying Windows operating system.
Antak
The power of Antak Web Shell comes from the use of PowerShell to interact with the windows target in a way the looks exactly like a C2 platform.
$ ls /usr/share/nishang/Antak-WebShell
antak.aspx Readme.md
$ cp /usr/share/nishang/Antak-WebShell/antak.aspx <target-directory>
PHP Web Shell
More Shells, but from the other side
Last updated