Главная
Study mode:
on
1
Introduction
2
Backdoor Bash on Windows
3
Bash on Windows - Previous research
4
Bash on Windows - Installation
5
Bash on Windows - Main difference
6
Bash on Windows - Where is Cygwin?
7
Bash on Windows - From Windows
8
Bash on Windows - Fun facts
9
Prerequisites
10
Remote shell - Having a Remote Shell
11
Remote shell - Add a package
12
Remote shell - Having a ELF Meterpreter Shell
13
Remote shell - Hide a Remote Shell
14
Get passwords and hashes
15
Get Domain Hash
16
On the attacker
17
Get Bash sudo password
18
On the victim (alternative)
19
Get Domain Password
20
Ask for local admin privileges
21
Bypass Applocker - Run a script
22
Bypass Applocker - Run a binary
23
Forensic
Description:
Explore the vulnerabilities and potential exploits of Bash for Windows in this 18-minute conference talk from Hack.lu 2018. Dive into the installation process, key differences from traditional Bash, and its relationship with Cygwin. Learn how to establish remote shells, add packages, and deploy ELF Meterpreter shells. Discover techniques for hiding remote shells, extracting passwords and hashes, and bypassing Applocker restrictions. Gain insights into forensic analysis and understand the prerequisites for exploiting Bash on Windows. Enhance your cybersecurity knowledge with practical demonstrations of backdoor creation, privilege escalation, and domain password retrieval.

Abusing Bash for Windows

Cooper
Add to list
0:00 / 0:00