Introduction:
How to Start?
Pre-Requirement:
* Hide yourself by Defensive Guide and assign VPN, for example can use by luxembourg via iceland of ProtonVPN Secure Core method.
* Ability to steal krb such as: mimikatz, Kekeo, Rubeus, Kerberoasting, Impacket ETC.
* Ability & Knowledge to Extracting and obfuscating binary Files
* Ability & Knowledge with C2 such as CobaltStrike, Havoc Open Source, Metasploit, Atomic Red Team ETC to take control to allow advanced adversary simulation platforms c2 capabilities including command execution, lateral movement and data exfiltration.
List of tools and software for this guide
Note: The first step can also be performed using by only Alpha or any device with the ability to perform WiFi Monitoring around it, following the rest of the components and software, you can perform the same Cobalt Strike
commands also via Havoc
ETC. And obfuscate the binary payload that C2 operations provides by alternative for Shhhloader
such as Veil Framework
Nimcrypt
Donut
Obfuscation with Metasploit's msfvenom
ScareCrow
Sharpshooter
Covenant
LutziTube(current)