Remotely Control Any PC With This Simple Tool!
Maruf Farhan
Lecturer at Ulster University London | CSC Tutor at Sussex ISC | Lecturer (Cybersecurity) at Coventry University | Educator at Kingsley Institute | MSc Cybersecurity | Comp Sec+ Certified | Blockchain Researcher
Welcome to this week's edition of our cybersecurity newsletter. Today, we're excited to share with you an in-depth look at the Koadic tool, a Windows Remote Administration Tool (RAT) that has been gaining attention in the cybersecurity community. Our team of experts has conducted extensive research on Koadic, and we're pleased to offer a hands-on demonstration of its capabilities in our lab. We'll walk you through how the tool works, its potential risks and benefits, and share our insights on how it can be used for legitimate and malicious purposes. So, grab a cup of coffee and join us as we explore the world of Koadic and its impact on cybersecurity. Let's get started.
So first, let's introduce the simple tool. The name of the tool is "KOADIC." Koadic (also known as COM Command & Control) is an open-source penetration testing tool designed to simulate Command and Control (C2) channels between an attacker and a compromised target. It focuses mostly on Windows systems and uses the Component Object Model (COM) technology to send and receive messages.
Koadic is a Python-based Remote Access Trojan (RAT) that lets an attacker run commands and scripts on a Windows system that has been compromised. It can be used to do things like run code remotely, stay around, get more privileges, and move from one place to another.
If you are using the upgraded version of Kali Linux, the tool is already installed, and if it's now, you can download the tool from GitHub.
in my kali linux machine, its already installed.
so at first I need to open the terminal and type " koadic"
after that you will see the window of Koadic.
Let's begin by loading the?mshta?stager by running the command below. The stager allows us to define where the Koadic command and control is accessed by any "zombie" devices.? so after that you need to type " options"
The stager lets us set the IP, port, expiration date, and, if we want, keys and certificates for the command and control. The default port of "9999" should work fine for our test environment. However, the "SRVHOST" IP value should be checked to ensure it matches your IP on your local network or the VPS or server that Koadic is running on. To set it by hand, run the following command, where IP is the IP address you want the staging server to have. in the picture, "ENDPOINT" name is Bmn0c. To attract the target, you can rename this ENDPOINT as a virus scan or anything else so that he can be easily targeted. Here, I didn't change the name.
Once the staging server is configured, it's ready to be started. Launch the stager by typing?run?on the Koadic command line and pressing?Enter.
Now you need to press run, and the payload will be ready. So as an attacker, you need to send the payload link via any phishing link so that he can click on the link and it can directly open in cmd.
Once he clicks on the link, then BOOM! Then, in the Koadic terminal, you can see the machine is now connected to you:
In the above image, you can see my Windows server details are showing, and now we get a ZOMBIE on an attacker's machine, as shown in the image above. Zombie in Koadic is just like a session in Metasploit. The “zombies” command can be used to view all the sessions we have.
So now we want to interact with the cmd and zombie shell attack. Now we will type in the terminal cmdshell 0 . Now we will check the IP address of the hacked device and what the files in the system are.
So I investigated further, such as learning the device's password. so here, we will type in the terminal " use implant/phish/password_box " and then type the " info" command to see the box.
So the above picture shows the message box. This is the message the user will see when the attacker issues commands from his device. So now the attacker will type " set ZOMBIE 0 " then the payload will start working, and the user will see the password window.
So once the user types the password in the script box, the attacker will get the password immediately in the kali linux terminal.
Now the attacker has everything from the user's device, such as IP address, directory folder and password, so he can do whatever he wants and get valuable data from the machine.
It's important to note that the Koadic tool can be used for legitimate penetration testing purposes and malicious activities. Therefore, educating people or organizations on its proper use and potential risks is essential.
Here are a few ways to educate people or organizations about Koadic and other Windows RAT tools:
Overall, educating people and organizations about the risks and proper use of Windows RAT tools like Koadic is critical to mitigating potential cyber threats and maintaining a strong security posture.
[ THIS WHOLE DEMONSTRATION WAS FOR EDUCATIONAL PURPOSES]