Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

C2C needs to take arguments #2

Open
grav3m1nd-byte opened this issue Oct 16, 2022 · 25 comments
Open

C2C needs to take arguments #2

grav3m1nd-byte opened this issue Oct 16, 2022 · 25 comments
Labels
good first issue Good for newcomers

Comments

@grav3m1nd-byte
Copy link

At the moment, I started testing this out after reading about it and quite frankly looks promising.

After a brief review, one thing that C2C should have is that at least it takes arguments so users provides IP address and/interface to bind to plus the port.

At the moment, my time is slightly limited, but I can contribute and take care of that part in like two weeks.

@SaumyajeetDas
Copy link
Owner

Sure.

@ajarham14
Copy link

Alright but how I run it in termux,

Guide me plz

@ajarham14
Copy link

Sure.

How I run it in termux app..
Plz tell me.
It may be working in termux. Or not

@rly0nheart
Copy link

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

@SaumyajeetDas
Copy link
Owner

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

Sure.

@rly0nheart rly0nheart mentioned this issue Oct 16, 2022
6 tasks
@grav3m1nd-byte
Copy link
Author

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

Hi @rly0nheart, if you can take care of it, I'd say go for it. I don't have the bandwidth right now to work on this so feel free to jump ahead.

@grav3m1nd-byte
Copy link
Author

Sure.

How I run it in termux app.. Plz tell me. It may be working in termux. Or not

Hi there,

I am not sure if it running on termux or not should be part of this Issue where we are looking to have the C2C script accept sysargs instead of having to modify the script. Not too familiar with termux, but should run similarly to any other terminar emulator.

@grav3m1nd-byte
Copy link
Author

@SaumyajeetDas and @rly0nheart, I can open a new issue for this that i'm gonna say, but it would be nice if the payload script could be used remotely as well and/or to simply create a payload that doesn't rely on loading the script on the target machine and then installing python. What do you guys think?

@rly0nheart
Copy link

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

Hi @rly0nheart, if you can take care of it, I'd say go for it. I don't have the bandwidth right now to work on this so feel free to jump ahead.

I made the changes, and added a few improvements, I thought it would be great if the payload got generated by passing the right argument, so I added a payload_builder.py file.

Note

I was making the changes on windows and the c2c.py and the payload.py got detected by my Bitdefender

@grav3m1nd-byte
Copy link
Author

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

Hi @rly0nheart, if you can take care of it, I'd say go for it. I don't have the bandwidth right now to work on this so feel free to jump ahead.

I made the changes, and added a few improvements, I thought it would be great if the payload got generated by passing the right argument, so I added a payload_builder.py file.

Note

I was making the changes on windows and the c2c.py and the payload.py got detected by my Bitdefender

Yeah, I realized you already worked on this. I'm reviewing these changes and I like it.

If these got detected, it might be a matter of time before other AVs start detecting it...maybe not.

@rly0nheart
Copy link

Sure.

How I run it in termux app.. Plz tell me. It may be working in termux. Or not

Hi there,

I am not sure if it running on termux or not should be part of this Issue where we are looking to have the C2C script accept sysargs instead of having to modify the script. Not too familiar with termux, but should run similarly to any other terminar emulator.

@SaumyajeetDas and @rly0nheart, I can open a new issue for this that i'm gonna say, but it would be nice if the payload script could be used remotely as well and/or to simply create a payload that doesn't rely on loading the script on the target machine and then installing python. What do you guys think?

If the payload got compiled (with pyinstaller or an alternative), it would run without requiring python on the target

@rly0nheart
Copy link

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

Hi @rly0nheart, if you can take care of it, I'd say go for it. I don't have the bandwidth right now to work on this so feel free to jump ahead.

I made the changes, and added a few improvements, I thought it would be great if the payload got generated by passing the right argument, so I added a payload_builder.py file.

Note

I was making the changes on windows and the c2c.py and the payload.py got detected by my Bitdefender

Yeah, I realized you already worked on this. I'm reviewing these changes and I like it.

If these got detected, it might be a matter of time before other AVs start detecting it...maybe not.

That's a great idea, I did not get to test the changes properly, so there might be some bugs

@rly0nheart
Copy link

Let's hope they don't get detected by other AV's👀😅

@grav3m1nd-byte
Copy link
Author

Hello, can I modify it and add arguments as requested in issue #2 ?, I will open a pull request once I finish

Hi @rly0nheart, if you can take care of it, I'd say go for it. I don't have the bandwidth right now to work on this so feel free to jump ahead.

I made the changes, and added a few improvements, I thought it would be great if the payload got generated by passing the right argument, so I added a payload_builder.py file.

Note

I was making the changes on windows and the c2c.py and the payload.py got detected by my Bitdefender

Yeah, I realized you already worked on this. I'm reviewing these changes and I like it.
If these got detected, it might be a matter of time before other AVs start detecting it...maybe not.

That's a great idea, I did not get to test the changes properly, so there might be some bugs

Where did you make the changes? on VIM or VSCode? If you used VIM, you can use pylint and at least use a linter (it won't necessarily help with bugs but it's something).

@grav3m1nd-byte
Copy link
Author

grav3m1nd-byte commented Oct 17, 2022

Let's hope they don't get detected by other AV'seyessweat_smile

Honestly, it is just room for improvement, or at least that what it means to me. The fact that this project was created and works is cool enough.

You know, it is possible it got flagged because fodhelper.exe exists in the code, and that is now known to be used for UAC bypass. If so, that is another reason to get this project to create custom payloads offline, instead of loading the script into the victim machine to then use it.

BTW, try and test Hoaxshell. It does the try and pretty good.

@SaumyajeetDas
Copy link
Owner

SaumyajeetDas commented Oct 17, 2022

Give me a bit guys.
Me and @ANON4MOUS is thinking to collaborate with you. Can we create one group we just want to discuss few things.

Please do share your thoughts guys.
Looking forward to work with you.

@rly0nheart
Copy link

Let's hope they don't get detected by other AV'seyessweat_smile

Honestly, it is just room for improvement, or at least that what it means to me. The fact that this project was created and works is cool enough.

You know, it is possible it got flagged because fodhelper.exe exists in the code, and that is now known to be used for UAC bypass. If so, that is another reason to get this project to create custom payloads offline, instead of loading the script into the victim machine to then use it.

Agreed!, Also I made the changes on VS Code, I did not encounter any syntax errors, but you never know

@grav3m1nd-byte
Copy link
Author

Give me a bit guys. Me and @ANON4MOUS is thinking to collaborate with you. Can we create one group we just want to discuss few things.

Sure thing...I mean, I just got wrapped up in thinking about the potential here 😄

@SaumyajeetDas
Copy link
Owner

Thanks for your help.
Please do tell your preferable medium for the group.

@grav3m1nd-byte
Copy link
Author

Thanks for your help. Please do tell your preferable medium for the group.

I'm open to anything...Discord maybe?

@SaumyajeetDas
Copy link
Owner

No problem at our end.
Lets wait for @rly0nheart

@rly0nheart
Copy link

Discord is good 🔥

@rly0nheart
Copy link

No problem at our end. Lets wait for @rly0nheart

Sure, create the group and add me, rly0nheart#2779

@rly0nheart
Copy link

Let's hope they don't get detected by other AV'seyessweat_smile

Honestly, it is just room for improvement, or at least that what it means to me. The fact that this project was created and works is cool enough.

You know, it is possible it got flagged because fodhelper.exe exists in the code, and that is now known to be used for UAC bypass. If so, that is another reason to get this project to create custom payloads offline, instead of loading the script into the victim machine to then use it.

BTW, try and test Hoaxshell. It does the try and pretty good.

Just looked at hoaxshell, looks good!

@rly0nheart

This comment was marked as off-topic.

@SaumyajeetDas SaumyajeetDas added the good first issue Good for newcomers label Oct 17, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Good for newcomers
Projects
None yet
Development

No branches or pull requests

4 participants