-
Notifications
You must be signed in to change notification settings - Fork 5
Implant
zusmani26 edited this page Apr 12, 2023
·
3 revisions
The implant comes into play once red team is ready to execute the final stages of the exploitation of the vulnerabilities of a network or system. The implant is the what the attacker uses to execute attacks on the target system (i.e. stealing or altering data).
Our implant authenticates with the server and gathers general information about target system. Implant will be able to work on Windows and Linux.
Implant has an interactive shell, this will be done by enabling a bi-directional TLS streaming on i/o.