How to find external ip address a payload uses to connect back to the attacker?

I find myself targeted with a malicious .apk file. I am provided with some malicious files disguised as a genuine .apk.

I used apktool to decompile the file and collect some information about the attacker. I could find none (please point… Continue reading How to find external ip address a payload uses to connect back to the attacker?

Penetration testing of windows ( Corporate systems )

So I am part of the team where in we have to conduct a penetration testing assignment for our client. Basically what he wants from us is to show how we can get into their system with the help of phishing, and for the POC he wants us to show the listener which we set up.

  • My understanding here is to create an exploit with metasploit -> set up the listener -> send the exploit to users -> make them click the attachment = Boom, we get the shell.

Idea wise this is correct but I am stuck at the execution.

  • How do I encode my exploit so that I doesn’t get detected by the AV. here I have tried the obvious .exe approach which gets detected and deleted immediately. similarly I tried binding it with a pdf which also got detected by the AV.
  • Secondly I am using dynamic IP. In-order to to get it working I tried no-ip which has changed to now-dns and created a host name against my ip. I am not clear to what do I do next, I entered the host name in the listener ip, but how will I get the shell or the listener.
  • Suggestions for the ideal exploit in this scenario – are there any other approaches that I can consider in this case which could help in getting the desired result.

Feel free to correct me if I am wrong at anyplace. I am new in this area so could have missed few things.

Continue reading Penetration testing of windows ( Corporate systems )