Skip to content

Commit fca46c9

Browse files
committed
decoy more agresive take snapshots of screen and video of webcam and bloodhound zip surface attack
1 parent a2aad23 commit fca46c9

39 files changed

+6914
-394
lines changed

Dokerfile.dockerfile

Lines changed: 0 additions & 25 deletions
This file was deleted.

README.md

Lines changed: 70 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ One of the standout features of **LazyOwn: CRIMEN** is its ability to schedule t
6060

6161
1. **Comprehensive Attack Library**: Over 500 crafted attacks for various environments, each a testament to the framework's depth and versatility, augmented by the extensive attack library of the Atomic RedTeam Framework.
6262
2. **Interactive CLI**: Based on cmd2, offering an intuitive and efficient command-line experience.
63-
3. **Decoy**: if the ip addres not match with 127.0.0.1 or lhost flask will show a decoy website
63+
3. **Decoy**: if the ip addres not match with 127.0.0.1 or lhost flask will show a decoy website this decoy site will record a video with audio and take pictures from the intruder (sessions/captured_images) like a small versión of storm breaker to know who is the blueteam operator
6464
4. **Adversary Simulation**: Advanced capabilities for generating red team operation sessions, ensuring meticulous and effective simulations.
6565
5. **Task Scheduling**: Utilize the `cron` command to schedule and automate tasks, enabling persistent threat simulations.
6666
6. **Real-Time Results**: Obtain immediate feedback and results from security assessments, ensuring timely and accurate insights.
@@ -88,12 +88,14 @@ One of the standout features of **LazyOwn: CRIMEN** is its ability to schedule t
8888
- **compressdir:**[directory]: Compresses a directory into a .tar.gz file and exfiltrates it.
8989
- **terminate:** Terminates the implant or beacon, removing files and persistence mechanisms.
9090
10. **Rootkit**: Linux rootkit and Windows Malware to ensure persistence and undetectable.
91+
11. **Surface attack**: We are pleased to document the new surface attack functionality. This feature allows the operator to upload a ZIP archive of Bloodhound capture data (validated with bloodhound.py) at any time via the main page. Upon upload, the system will render the complete attack surface, augmented with identified machines discovered through automated methods or system commands such as **lazynmap** (At WebCli can you click at the Host Icon and will paste the command to discover that host.), **nmap**, **discovery**, and **run lazynmapdiscovery**. These supplementary data sources will enrich the graphical representation, populating nodes within the attack surface. The interface will provide integrated controls for searching, filtering, enumerating, and correlating the various attack vectors. It is crucial to note that this feature is not intended as a replacement for Bloodhound. Its scope is limited to providing a rapid overview and efficient filtering of collected information to facilitate attack phase planning. For detailed attack guidance and exploitation, the operator is directed to the established Bloodhound toolset.
9192

9293
## Command Capabilities
9394

9495
**LazyOwn: CRIMEN** offers a rich set of commands that can be executed from both the CLI and the web interface, each designed to empower users with unparalleled control and flexibility:
9596

9697
- **addhosts**: Add the domain and rhost to /etc/hosts file to route the attacks.
98+
- **aliass**: Show all documented commands alias (use 'help -v' for verbose/'help <topic>' for details or use aliass)
9799
- **list**: Enumerates all available LazyOwn Modules within the framework, providing a comprehensive overview of the toolkit's capabilities.
98100
- **assign**: Configures specific parameters for the operation, such as `assign rhost 192.168.1.1` to define the target IP address, ensuring precise and tailored attacks.
99101
- **createcredentials**: Add credentials exfiltrated to be used in the attacks or tests. `createcredentials admin:adminpassword`
@@ -103,7 +105,9 @@ One of the standout features of **LazyOwn: CRIMEN** is its ability to schedule t
103105
- **exit**: Gracefully exits the CLI, concluding the session with elegance and finality.
104106
- **auto**: Execute all tools files enabled in the tool directory that are relevant to the Nmap scan report.
105107
- **help**: Documented commands (use 'help -v' for verbose/'help <topic>' for details)
106-
108+
- **history**: show the history of the commands in the cli.
109+
- **edit**: An vim to edit files
110+
- **ipy**: An Ipython3 interpreter
107111

108112
Originally designed to automate the search and analysis of binaries with special permissions on Linux and Windows systems, LazyOwn has evolved to encompass a broader range of functionalities. The project includes scripts that extract information from GTFOBins, analyze binaries on the system, and generate options based on the collected data.
109113

@@ -441,8 +445,7 @@ Available Scripts
441445
[+] lazypathhijacking lazyarpspoofing lazyftpsniff [👽]
442446
[+] lazyssh77enum lazywerkzeugdebug [👽]
443447

444-
445-
┌─[LazyOwn👽10.10.14.16/khali ~/home/grisun0/LazyOwn][10.10.11.52][http://bigbang.htb/]
448+
┌─[LazyOwn👽10.10.14.92/khali ~/home/grisun0/LazyOwn][10.10.11.69][http://fluffy.htb]
446449
└╼ $ ?
447450

448451
Documented commands (use 'help -v' for verbose/'help <topic>' for details):
@@ -461,24 +464,25 @@ dnstool_py openssl_sclient tcpdump_icmp
461464

462465
02. Scanning & Enumeration
463466
==========================
464-
ad_ldap_enum evil_ssdp net_rpc_addmem rpcmap_py
465-
allin feroxbuster netexec samrdump
466-
amass finger_user_enum netview sawks
467-
arjun fuzz nikto sessionssh
468-
arpscan getnpusers nmapscript skipfish
469-
batchnmap gobuster nuclei smbattack
470-
bbot hostdiscover odat smbclient
471-
blazy hound openredirex smbclient_impacket
472-
bloodhound kerbrute osmedeus smbclient_py
473-
breacher ldapdomaindump parsero smbmap
474-
certipy ldapsearch parth smtpuserenum
475-
changeme lookupsid portdiscover snmpcheck
476-
cme lookupsid_py portservicediscover snmpwalk
477-
davtest loxs pre2k swaks
478-
dirsearch lynis pykerbrute vscan
479-
dmitry magicrecon rdp_check_py wfuzz
480-
enum4linux mqtt_check_py rpcclient windapsearch
481-
enum4linux_ng nbtscan rpcdump wpscan
467+
ad_ldap_enum feroxbuster netexec sawks
468+
allin finger_user_enum netview sessionssh
469+
amass fuzz nikto skipfish
470+
arjun getnpusers nmapscript smbattack
471+
arpscan gobuster nuclei smbclient
472+
batchnmap hostdiscover odat smbclient_impacket
473+
bbot hound openredirex smbclient_py
474+
blazy kerbrute osmedeus smbmap
475+
bloodhound lazynmap parsero smtpuserenum
476+
breacher ldapdomaindump parth snmpcheck
477+
certipy ldapsearch portdiscover snmpwalk
478+
changeme lookupsid portservicediscover swaks
479+
cme lookupsid_py pre2k vscan
480+
davtest loxs pykerbrute wfuzz
481+
dirsearch lynis rdp_check_py windapsearch
482+
dmitry magicrecon rpcclient wpscan
483+
enum4linux mqtt_check_py rpcdump
484+
enum4linux_ng nbtscan rpcmap_py
485+
evil_ssdp net_rpc_addmem samrdump
482486

483487
03. Exploitation
484488
================
@@ -500,16 +504,20 @@ gets4uticket_py printerbug_py sqli_mssql_test
500504

501505
04. Post-Exploitation
502506
=====================
503-
adversary disableav ofuscate_string scp
504-
ai_playbook exe2bin ofuscatesh service_ssh
505-
apt_proxy extract_yaml ofuscatorps1 sessionsshstrace
506-
apt_repo find path2hex shellcode
507-
atomic_lazyown follina pezorsh shellcode2elf
508-
bin2shellcode hex2shellcode pip_proxy shellcode2sylk
509-
cports internet_proxy pip_repo shellcode_search
510-
create_synthetic issue_command_to_c2 powershell_cmd_stager ssh_cmd
511-
createpayload lazywebshell rubeus
512-
d3monizedshell mimikatzpy scavenger
507+
adversary extract_yaml pip_repo
508+
adversary_yaml find powershell_cmd_stager
509+
ai_playbook follina rubeus
510+
apt_proxy hex2shellcode scavenger
511+
apt_repo internet_proxy scp
512+
atomic_lazyown issue_command_to_c2 service_ssh
513+
bin2shellcode lazywebshell sessionsshstrace
514+
convert_remcomsvc_from_file mimikatzpy shellcode
515+
cports ofuscate_string shellcode2elf
516+
create_synthetic ofuscatesh shellcode2sylk
517+
createpayload ofuscatorps1 shellcode_search
518+
d3monizedshell path2hex ssh_cmd
519+
disableav pezorsh
520+
exe2bin pip_proxy
513521

514522
05. Persistence
515523
===============
@@ -561,13 +569,13 @@ attack_plan duckyspark iis_webdav_upload_asp my_playbook
561569

562570
11. Reporting
563571
=============
564-
apropos createtargets gpt pup
565-
banners download_malwarebazar groq vulns
566-
c2asm extract_ports malwarebazar
567-
camphish eyewitness morse
568-
create_session_json eyewitness_py name_the_hash
569-
createjsonmachine get_avaible_actions nmapscripthelp
570-
createjsonmachine_batch gowitness pth_net
572+
apropos createtargets gpt process_scans
573+
banners download_malwarebazar groq pth_net
574+
c2asm extract_ports img2vid pup
575+
camphish eyewitness malwarebazar vulns
576+
create_session_json eyewitness_py morse
577+
createjsonmachine get_avaible_actions name_the_hash
578+
createjsonmachine_batch gowitness nmapscripthelp
571579

572580
12. Miscellaneous
573581
=================
@@ -595,25 +603,28 @@ generate_msfvenom_loader visualize_network
595603

596604
14. Yaml Addon.
597605
===============
598-
commix2 laps lazymapd lazyownbt orpheus peeko ridenum spoonmap unicorn
606+
bbr GoPEInjection laps oniux PTMultiTools spoonmap
607+
commix2 hack_browser_data lazymapd orpheus PTMultiTools_scan unicorn
608+
gcr hooka_linux_amd64 lazyownbt peeko ridenum upxdump
609+
610+
15. Adversary YAML.
611+
===================
612+
implant_crypt_go
599613

600614
Uncategorized
601615
=============
602-
alias EOF nc_ldap_interact shell
603-
asrep_roast getNPUsers_tool nuclei_ad_http shortcuts
604-
bloodhound-python help nxc_idap_tool showmount_nfs
605-
crackmapexec_ldap history nxc_ldap showmount_tool
606-
crackmapexec_smb ipp nxc_null_session smb_ghost
607-
dig_any ipy nxc_pass_policy smb_map
608-
dig_reverse kerberoasting_tool nxc_rid smbclient_list
609-
dns_enum_tool kerbrute_tool quit smbclient_tool
610-
dnsrecon_axfr kerbrute_tool_user rpcclient_tool smbmap_tool
611-
edit ldap_domain_dump_tool rrhost smbserver_tool
612-
enum4linux_tool ldapsearch_anon run_pyscript userEnum_tool
613-
enum_rpcbind ldapsearch_tool run_script
614-
enum_smb macro set
615-
616-
616+
alias EOF ldapsearch_tool run_script
617+
asrep_roast getNPUsers_tool macro set
618+
bloodhound-python GetUserSPNs.py nc_ldap_interact shell
619+
crackmapexec_ldap help nuclei_ad_http shortcuts
620+
crackmapexec_smb history nxc_idap_tool smb_ghost
621+
dig_any ipp nxc_ldap smb_map
622+
dig_reverse ipy nxc_null_session smbclient_list
623+
dns_enum_tool kerberoasting_tool nxc_pass_policy smbclient_tool
624+
dnsrecon_axfr kerbrute_tool nxc_rid smbmap_tool
625+
edit kerbrute_tool_user quit smbserver_tool
626+
enum4linux_tool ldap_domain_dump_tool rrhost userEnum_tool
627+
enum_smb ldapsearch_anon run_pyscript
617628
```
618629
## Tag in youtube
619630
<https://www.youtube.com/hashtag/lazyown>
@@ -1111,7 +1122,7 @@ This project is licensed under the GPL v3 License. The information contained in
11111122

11121123
## Acknowledgments ✌
11131124

1114-
A special thanks to [GTFOBins](https://gtfobins.github.io/) for the valuable information they provide and to you for using this project. Also, thanks for your support Tito S4vitar! who does an extraordinary job of outreach. Of course, I use the `extractPorts` function in my `.zshrc` :D, thanks to deepwiki to help us with doc. ( https://deepwiki.com/grisuno/LazyOwn/ )
1125+
A special thanks to [GTFOBins](https://gtfobins.github.io/) for the valuable information they provide and to you for using this project. Also, thanks for your support Tito S4vitar! who does an extraordinary job of outreach. Of course, I use the `extractPorts` function in my `.zshrc` :D, thanks to deepwiki to help us with doc. ( https://deepwiki.com/grisuno/LazyOwn/ ), thanks to plaintext who does an extraordinary job of outreach and we adopted PTMultiTools it's very impresive
11151126

11161127
### Thanks to pwntomate 🍅
11171128

@@ -1155,6 +1166,9 @@ LazyOwn is a framework that streamlines its workflow and automates many tasks an
11551166

11561167
Documentation automatically created by the script `readmeneitor.py` created for this project; maybe one day it will have its own repo, but for now, I don't see it as necessary.
11571168

1169+
# Legal disclaimer:
1170+
Usage of LazyOwn RedTeam Framework for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
1171+
11581172
<!-- START UTILS -->
11591173
# UTILS.md Documentation by readmeneitor.py
11601174

0 commit comments

Comments
 (0)