Skip to content

Commit 27e938b

Browse files
committed
update: readme with demo and pictures
1 parent b880fb4 commit 27e938b

25 files changed

+110
-2
lines changed

README.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,12 @@
11
## Create Hacking Environment
22

3-
### USAGE
3+
### USAGE
44

5-
[readme](./documents/USE.md)
5+
[Usage Readme](./documents/USE.md)
6+
7+
[Custom Readme](./documents/CUSTOM.md)
8+
9+
[Demo](./documents/DEMO.md)
610

711
### AIM of project (which problem this project try to solve)
812

documents/DEMO.md

Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
## Demo of usage
2+
3+
### Tasks
4+
5+
#### msfvenom payload generate
6+
7+
1. Ctrl+Shift+P to open command palette
8+
9+
![](./imgs/vsc-task-panel.png)
10+
11+
2. select `Tasks: Run Task` and select `msfvenom-payload-creating`
12+
13+
![](./imgs/vsc-choose-task.png)
14+
15+
3. input options for payload
16+
17+
![](./imgs/tasks-msf/choose-payload.png)
18+
![](./imgs/tasks-msf/add-lhost.png)
19+
![](./imgs/tasks-msf/add-lport.png)
20+
![](./imgs/tasks-msf/choose-advanced-opt.png)
21+
![](./imgs/tasks-msf/payload-format.png)
22+
![](./imgs/tasks-msf/edit-output-file.png)
23+
24+
4. generate payload
25+
26+
![](./imgs/tasks-msf/task-run.png)
27+
28+
### Terminals
29+
30+
using ![](./imgs/terminal.png)
31+
32+
#### normal zsh injected env
33+
34+
direct use `+` to init the default zsh shell
35+
36+
and you will got the env defined in `env.zsh` and `source.zsh`
37+
38+
you can do thing like
39+
40+
use env var in command ![](./imgs/env_define.png) ![](./imgs/env_reuse_in_rustscan.png)
41+
42+
fast folder jumping ![](./imgs/env_folder_jump.png)
43+
44+
#### meterpreter handler
45+
46+
use `meterpreter-handler` to init the msfconsole with the rcfile
47+
48+
![](./imgs/msfconsole.png)
49+
50+
#### netcat handler
51+
52+
##### netcat + rlwrap (default)
53+
54+
use `netcat-handler` to init the netcat listener
55+
56+
(you know the 6789 port is default $LPORT in `env.zsh`, I just reuse it in `revshell.zsh`)
57+
58+
and victim using payload to reverse its shell
59+
60+
![](./imgs/netcat-victim.png)
61+
62+
and gain the shell
63+
64+
![](./imgs/netcat-master.png)
65+
66+
##### pwncat-cs
67+
68+
just replace payload in `revshell.zsh` with pwncat-cs
69+
70+
![](./imgs/modify_pwncat.png)
71+
72+
![](./imgs/pwncat-master.png)
73+
74+
and trigger shell on remote
75+
76+
![](./imgs/netcat-victim.png)
77+
78+
gain shell with pwncat
79+
80+
![](./imgs/pwncat-rev2.png)
81+
82+
and then do anything you need.
83+
84+
#### web delivery
85+
86+
use `web-delivery` to init the http server in the project folder, default is in the $PROJECT_WEB_DELIVERY
87+
88+
1. starting http server with `web-delivery` terminal
89+
90+
2. copy available payloads or scripts to $PROJECT_WEB_DELIVERY
91+
![](./imgs/web-delivery-put-payload.png)
92+
93+
3. vicitim get payload via http
94+
![](./imgs/web-delivery-victim.png)
95+
96+
4. attacker get the request log in the terminal
97+
![](./imgs/web-delivery-log.png)
98+
99+
> ur can use such function get xss result as well.
100+
101+
#### macos kali orbstack vm with injected env
102+
103+
![](./imgs/osx-orbstack-kali-root.png)
104+

documents/imgs/env_define.png

52.7 KB
Loading

documents/imgs/env_folder_jump.png

159 KB
Loading
162 KB
Loading

documents/imgs/modify_pwncat.png

44.9 KB
Loading

documents/imgs/msfconsole.png

270 KB
Loading

documents/imgs/netcat-master.png

37.4 KB
Loading

documents/imgs/netcat-victim.png

193 KB
Loading
70 KB
Loading

0 commit comments

Comments
 (0)