User Tools

Site Tools


create_a_phishing_campaign_with_malware_simulations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
create_a_phishing_campaign_with_malware_simulations [2016/10/21 12:11] lucycreate_a_phishing_campaign_with_malware_simulations [2016/12/05 19:04] lucy
Line 39: Line 39:
   *   **Microphone**: Get audio recording from microphone for a short period. Display GUI option may have a value of 0 to 4: 0 - no GUI, 1 - Progress Bar, 2 - Decryptor Window, 3 or 4 - Error Message Window.   *   **Microphone**: Get audio recording from microphone for a short period. Display GUI option may have a value of 0 to 4: 0 - no GUI, 1 - Progress Bar, 2 - Decryptor Window, 3 or 4 - Error Message Window.
   * **WebRecorder**: Records screenshots and tries to access the webcam to record a few seconds as a PoC.   * **WebRecorder**: Records screenshots and tries to access the webcam to record a few seconds as a PoC.
 +  * **Ransomware Screenlocker**: Will lock the PC screen and ask the user to enter a password that can be set in the backend. The idea is to have the user call some helpdesk to ask for the password to have a better learning effect.
   * **ConsoleInteractive**: This tool allows you to establish a reverse HTTP/HTTPS channel to LUCY. Once the file has been executed, you can see the session in “Sessions”. The tool only runs in the memory (called “file” in Process View). After the termination, the session can no longer be established. You can click on the IP and start executing commands within the Windows shell. The output should appear after a few seconds automatically. This Tool only works with Windows 7/8 in combination with IE and Firefox. More background info can be found [[interactive_reverse_http_s_sessions|here]].   * **ConsoleInteractive**: This tool allows you to establish a reverse HTTP/HTTPS channel to LUCY. Once the file has been executed, you can see the session in “Sessions”. The tool only runs in the memory (called “file” in Process View). After the termination, the session can no longer be established. You can click on the IP and start executing commands within the Windows shell. The output should appear after a few seconds automatically. This Tool only works with Windows 7/8 in combination with IE and Firefox. More background info can be found [[interactive_reverse_http_s_sessions|here]].
  
create_a_phishing_campaign_with_malware_simulations.txt · Last modified: 2021/12/15 13:20 by lucy