Command & Control Tool: Pupy
In this article, we will learn to exploit Windows, Linux and Android with pupy command and control tool.
Table of Content :
- Introduction
- Installation
- Windows Exploitation
- Windows Post Exploitation
- Linux Exploitation
- Linux Post Exploitation
- Android Exploitation
- Android Post Exploitation
Introduction
Pupy is a cross-platform, post exploitation tool as well as a multi-function RAT. It’s written in python which makes it very convenient. It also has low detectability that’s why it’s a great tool for the red team. Pupy can communicate using multiple transports, migrate into processes using reflective injection, and load remote python code, python packages and python C-extensions from memory.
It uses a reflected DLL to load python interpreter from memory which is great as nothing will be shown in the disk. It doesn’t have any special dependencies. It can also migrate into other processes. The communication protocols of pupy are modular and stackable. It can execute non-interactive commands on multiple hosts at once. All the interactive shells can be accessed remotely.
Full Article Read Here
Honorably discharged from the ARMY //Cyber Operations//Red Team Lead
5yVery nice. What's your favorite CTF and why?