Change post-exploit behavior to hijack a system service for SSH server #9
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Changes the post-exploit behavior so that instead of creating a
cmd.exe
reverse shell, we will hijack a system service (etwuploader.exe
at this time) to inject / spawn a new process designated atsrv.exe
.srv.exe
is loosely expected to be the SSH daemon from https://github.com/exploits-forsale/solstice/tree/main/crates/solstice_daemon, but can be anything.