Command & Control Tool: Pupy

Command & Control Tool: Pupy

In this article, we will learn to exploit Windows, Linux and Android with pupy command and control tool.

Table of Content :

  • Introduction
  • Installation
  • Windows Exploitation
  • Windows Post Exploitation
  • Linux Exploitation
  • Linux Post Exploitation
  • Android Exploitation
  • Android Post Exploitation

Introduction

Pupy is a cross-platform, post exploitation tool as well as a multi-function RAT. It’s written in python which makes it very convenient. It also has low detectability that’s why it’s a great tool for the red team. Pupy can communicate using multiple transports, migrate into processes using reflective injection, and load remote python code, python packages and python C-extensions from memory.

It uses a reflected DLL to load python interpreter from memory which is great as nothing will be shown in the disk. It doesn’t have any special dependencies. It can also migrate into other processes. The communication protocols of pupy are modular and stackable. It can execute non-interactive commands on multiple hosts at once. All the interactive shells can be accessed remotely.

Full Article Read Here

Jonathan A.

Honorably discharged from the ARMY //Cyber Operations//Red Team Lead

5y

Very nice. What's your favorite CTF and why?

Like
Reply

To view or add a comment, sign in

More articles by Yashika Dhir

  • Comprehensive Guide on Hydra – A Brute Forcing Tool

    Comprehensive Guide on Hydra – A Brute Forcing Tool

    Today we are going to discuss – How much impact hydra has in cracking login credential of various protocols to make…

  • Hack the Box: Bounty Walkthrough

    Hack the Box: Bounty Walkthrough

    Today we are going to solve another CTF challenge “Bounty”. It is a retired vulnerable lab presented by Hack the Box…

    1 Comment
  • Comprehensive Guide on SearchSploit

    Comprehensive Guide on SearchSploit

    Hello friends!! Several times you might have read our articles on CTF challenges and other, where we have used…

  • Collection of 190 CTF Challenges Writeups (Vulnhub+HTB)

    Collection of 190 CTF Challenges Writeups (Vulnhub+HTB)

    Hack the Box: Olympus Walkthrough Hack the Box: Sunday Walkthrough Hack the Gemini inc:2 (CTF Challenge) Hack the Box…

  • Hack the BTRSys: v2.1 VM (Boot2Root Challenge)

    Hack the BTRSys: v2.1 VM (Boot2Root Challenge)

    BTRSys is boot2root challenge developed by ‘ismailonderkaya’ in the series of BRTSys. This is an amazing lab for…

  • Hack the BTRSys1 VM (Boot2Root Challenge)

    Hack the BTRSys1 VM (Boot2Root Challenge)

    BTRSys v1 is another lab by ‘ismailonderkaya’ in the series BTRSys. This lab helps you sharpen your skills as a…

  • Hack the SpyderSec VM (CTF Challenge)

    Hack the SpyderSec VM (CTF Challenge)

    You are looking for two flags. Using discovered pointers in various elements of the running web application you can…

  • Hack the VulOS 1.1 VM (CTF Challenge)

    Hack the VulOS 1.1 VM (CTF Challenge)

    “Your assignment is to pentest a company website, get root of the system and read the final flag” is the only thing we…

    1 Comment
  • Hack the SickOS 1.1 VM (CTF Challenge)

    Hack the SickOS 1.1 VM (CTF Challenge)

    This time we are going to crack SickOS 1.1 in the Boot2root challenges.

  • Hack the Fristileaks VM (CTF Challenge)

    Hack the Fristileaks VM (CTF Challenge)

    Today we will walk through the FristiLeaks VM. There is nothing that we know about this VM except for the fact that…

Insights from the community

Others also viewed

Explore topics