Shepard is an IN PROGRESS persistence tool using Windows Background Intelligent Transfer Service (BITS).
Running this executable with no arguments or an incorrect amount of arguments will cause shepard to exit cleanly.
BINDSHELL
The server (victim) is written using C#. It listens on port 6006.
Usage: run shepardsbind_serv.exe with no arguments.
The client (attacker) is written using Python and takes one argument: the IP address of the victim’s machine. Usage: run shepardsbind_recv.py with one argument: <victim’s IP>
Running shepardsbind_recv.py with no arguments will return an error. The prompt will look like: %SBS%.
Using Them In Conjunction
The only executable that must be on the victim’s machine is shepard.exe. Host the download bindshell executable to a publicly accessible place. Shepard will download and run the bindshell executable, and the user can now use the python receiver. If the shell is found and killed, it will restart after 30 seconds. Last steps in progress: finding out how to rerun shepard.exe to re-download in case the shell executable is deleted. Most likely will use a service.
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…