Project Rewriting using 🦀
1. Introduction2. How it Works
3. Attacking Linux
4. Attacking Windows
4. Powershell bible Hack
Mavoc is an tool used to pentest Windows and Linux machine. This tool mainly Focuses on Pentesting Windows . Made with using C++, Powershell and the server made with Python and go . This tool is Easy to use and the payloads are modifiable for your Needs . This tool is mainly Focuses on Windows Pentesting, and Automated Various Scripts to attack windows based System and can be used to add own scripts for ctf , attacking , debugging etc .. depends upon your needs .
Tested at : KALI LINUX and UBUNTU
mavoc-intro.mp4
Please Visit Mavoc Documentation for complete tutorial and Video Demonstration
The Tool can be used to get reverse shell in 3 various methods . SSH-Kench aka using rev-ssh RSSH , Python and Low Func C++ (coming soon) .
git clone https://github.com/Whitecat18/Mavoc
cd Mavoc
bash install.sh
./mavoc
git clone https://github.com/Whitecat18/Mavoc
cd Mavoc
bash install.sh
sudo ./mavoc
On Mavoc tool . There will be 2 options . SSH Hack , Python-Exin and Low-Func.
For Now SSH-Kench and Python-Exin are avaiable.
Based on your Needs Select what you need.
- SSH-Kench is more stable , even when you disconnect or shut the server,and start the server with same settings means, the victim can connect again.
- SSH-Kench is Well Suited to do Large Attacks and Good at stable connection.
- Python-Exin is an Powershell Payload prompter that alters the pre-payload (ie) Modifies it . When pasting the prompt payload script on .ps console will leads to get the reverse shell.
- Python-Exin is not Good for Stability and cant be used for large tasks and attack process .
- Python-Exin is an Older Version of Villain tool . Which i used to modify and keep it for my personal use . Now i am adding to the Tool .
First You Will be Prompted to Enter into the shell . Based upon what you need . You can select depend upon your needs.
Blog
After Entering ssh kench . Enter your local Ip addeess. eg:192.168.1.101
Entering yes ( y ) will start an server . For Now Lets continue with no ( n ) . Entering help command will display the avaiable cmds to execute . From There , lets start the server using start server command .
generate windows payload
Alters and gives the powershell payload .
generate linux payload
will give you the bash payload .
connect server
command will open an mavoc-shell on an new tmux terminal.
After Executing the payload given by the mavoc . you will get an connection to the mavoc-shell . Here's the Demo Video.
Note : Mavoc Server supports tab completion . you can use it to connect machines using connect and by pressing tab key to autocomplete .
Open the ssh kench and generate the payload using generate linux payload. Execute in the Shell and exit .
Please Visit Mavoc Documentation for more Demo Videos .
So the main part begins 👿. Lets do it
generate windows payload
and copy the payload and use your tricks and tips to deliver the payload.
Copy the powershell payload and execute in the victim machine.
After that check you server if you got an (RSSH) Reverse Shell connection . use ls command to check if it works and type and tab key to autocomplete the connection .
Tip: use Direct method or My Fav Part, use the Rubber Ducky or ATTINITY85 Digispark to execute the payload or bind the payload string to any know software or programs to os modules to exec it .
Demo Video
Please Visit Mavoc Documentation for Demo Videos .
Powershell bible consists of 20+ Advance attcking and Enumeration commands that will execute at mavoc-shell at tmux shell .
Some scripts are not added because it can be unfair to execute such scripts agaist user .The Scripts are in the Test Mode and will be added once its compactable with all windows Machines . Powershell bible is only For Windows Operating Systems .
Powershell bible is only For Windows Operating Systems . use ps bible
to load powershell modules
after getting connection from the victim . Execute ps bible
. Type help
for more info .
Ps bible can be used to Deliver the powershell scripts to perform actions .
For Example if you need to see the installed Applications on victim pc . you can drop a powershell script . just type the list exe apps
to list it .
Tip : There is an Nice Trick to get the admin shell by using get admin shell command .
Copy the above scirpt and paste in the mavoc-shell (ie) tmux shell . Executing this will send an UAC Access Permission ;)
If an Allows means . then you will get an (Admin reverse shell) 👿
This is an bit hard . cuz many people wont allow it . you can use the send msg box to send a social Engineer msges to victim ;) . ie i got one of my teacher's (Admin shell) like that ;)
you can check if you got an admin shell by executing check if admin on ps bible.
Demo Video ....
Please Visit Mavoc Documentation for Demo Videos .
For Step By Step Process . Please Visit this Blog where they Explain step by step Tmux Blog
Just an Referrence ...
- Enter Copy Mode: Press Ctrl + b (the default tmux prefix) followed by [ to enter copy mode. This is similar to scrolling mode and allows you to navigate and select text.
- Navigate and Select Text: Once you're in copy mode, you can use the arrow keys, Page Up, Page Down, and other navigation keys to move around and select the text you want to copy. To start selecting, move the cursor to the beginning of the text you want to copy.
- Begin Selection: Press Space to start selecting text. Move the cursor to highlight the desired text.
- Copy Text: After selecting the text, press Enter to copy the selected text to the clipboard.
- Exit Copy Mode: Press q to exit copy mode. You'll be back in the normal tmux session.
- Paste Text: You can now paste the copied text outside the tmux session using the usual paste command for your terminal emulator (usually Ctrl + Shift + v or right-click and select "Paste").
Rewriting in Rust 🦀