Practical with Havoc Framework
Teamserver Configuration
Teamserver needs a configuration profile (usually yml) to define parameters like IP, port, user and password.
Create configuration profile.
In the folder
teamserver/data
and fix and create fileconfig.yml
. Add script below.
Start Teamserver
Run teamserver with configuration profile
Start Client
Client is graphical interface to interact with teamserver
From folder client/build
, run client:
Setup Listener
Listener is the point of receiving connections from agents (Demons) on the victim machine.
In the interface client, navigate Listeners -> Create Listeners.
A configuration listener (example: HTTPS)
Name: at19n-test
Type: HTTPS
Host: IP Address teamserver or redirector
Port: 443
Callback Interval: Time between callbacks (example: 5s)
Save and start listener. If success, listener display status "Active"
Hands on
Install Extensions
Extensions list
After clicking install, Havoc client automatically clones the Shhhloader source from github.
Description: Shhhahoc is the name of the Shhhloader integration module into Havoc, which allows the use of advanced shellcode injection techniques to evade EDR/AV.
Fearture:
Use SysWhispers (SysWhispers2, SysWhispers3, GetSyscallStub) to execute syscall indirect
Supports injection methods like PoolParty, ThreadlessInject, ModuleStomping, QueueUserAPC, ProcessHollow.
Encode options shellcode and sign digital certificates to avoid detection.
Hands on
Create shellcode
Create and deployment Payload with Shhhloader
Use Shhhloader to inject demon.x64.bin
shellcode into legitimate NppConverter.dll
Purpose:
Create a malicious DLL (
NppConverter.dll
) containing shellcode that creates a connect to Havoc C2This DLL will be loaded by
notepad++.exe
on startup, execute shellcode viaQueueUserAPC
.On the Windows machine, we will change
NppConverter.dll
legitimate equal a malicious DLL to activate the payload.
/root/share/demon.x64.bin
: Path to Demon shellcode-sc GetSyscallStub
: UseGetSyscallStub
syscall method to avoid EDR hook-m QueueUserAPC
: Shellcode injection method usingQueueUserAPC
-o /root/share/NppConverter.dll
: The output file isNppConverter.dll
(a malicious DLL)-dp NppConverter.dll
: Create a proxy DLL based on the legitimateNppConverter.dll
-pp explorer.exe
: The parent process isexplorer.exe
-p notepad++.exe
: The target process for shellcode injection isnotepad++.exe
Hands on
Source Video
Last updated
Was this helpful?