Skip to content

Implant

zusmani26 edited this page Apr 12, 2023 · 3 revisions

Implant

Concept Overview

The implant comes into play once red team is ready to execute the final stages of the exploitation of the vulnerabilities of a network or system. The implant is the what the attacker uses to execute attacks on the target system (i.e. stealing or altering data).

Concept in Terms of Our Application

Our implant authenticates with the server and gathers general information about target system. Implant will be able to work on Windows and Linux.

Specifics

Implant has an interactive shell, this will be done by enabling a bi-directional TLS streaming on i/o.

Clone this wiki locally