
By: Z33MAX
June 10, 2016
Powershell Empire Stagers 2: Controlling the Victim's Machine

By: Z33MAX
June 10, 2016
Hello fellow Cybrarians,
In the last tutorial, Powershell Empire Stagers 1: Phishing with an Office Macro and Evading AVs, we covered creating a malicious macro and sending it to the victim.
Today, we're going to learn how to move around the system, once the connection is made, and gather some information about the target.
Terminology
Before we go deeper in the world of PowerShell Empire, let's clarify some common terminology:1- Stager: is considered a payload that can be executed on the target's machine in order to establish a connection between the attacker and the target's machine.2- Agent: is the target's machine that we are controlling
Tutorial Requirements
1- Empire installed on Kali Linux --- > See Part 12- Another machine to emulate the target's s machine (Mac or Windows OS)
Let's begin... Step 1: Get the ConnectionWhen the victim opens the file, you should get a connection back - in a form of green colored message says “Initial agent [name of the agent] now active”
Step 2: Show Agent’s Information
Type Agent to get the name of the agent, along with some basic information about the hacked system
>>help
At this point, we're only interested in interacting with the system
>>>> cd Desktop
6- Download or Upload Files
One of the great things about Empire is that you can download files from the hacked system or upload them to the hacked system (this can be used to replace clean files with malicious ones - as with Social Engineering efforts)
To download, type:
>>>> Download NameofTheFile.doc
- Note: Extensions of files are important
Also, we can upload files to the victim’s machine
To upload, type:
>>> upload nameOfFile
7- ScreenshotWe can take a screenshot of the system desktop by typing>>> usemodule/collection/screenshot
>>> execute
As you can see, PowerShell Empire is very powerful tool in gathering information about the target. It's a very stealthy and helpful way for a hacker/pentester to customize specific attacks in order to a gain foothold on the network.
That’ all for this tutorial. Stay tuned for more interesting topics and thank you for reading.@Z33MAXX