Everyone using the internet knows that one should never connect to any unverified wireless network and download suspicious files online. Yet, the severity of such dangerous acts is often underestimated. This project simulates a dynamic-link library (DLL) infection via server message block (SMB) delivery using a reverse TCP attack. The infected file with a malicious payload that exploits and exfils data is forwarded to the victim connected to the same WiFi network using Metasploit. We also discuss potential methods of obfuscating the data exfiltration, such as steganography. Additionally, we conduct possible irreversible damage to the victim's system by using it as a chance to gain command and control over it.
Part 1: Introduction and Plan of Attack https://drive.google.com/file/d/1OvvTi2jqHp3xrR4MuZM1xt-m7J_EDS5f/view?usp=sharing
Part 2: Demo https://drive.google.com/file/d/1dPre5ZO_KWf1-Hc1DVl0H7-5fGgPbKPN/view?usp=sharing
Part 3: Discussion and Potential Troubleshooting https://drive.google.com/file/d/1xuAJVssqTJCqUxFPua_6D1C5JT387WqP/view?usp=sharing
Lecture Slides: https://drive.google.com/file/d/1u5qa4GrWa7lM3_-McFejj_83RAowhnRt/view?usp=sharing