On-Site Implant

On-Site Implant
Download Copy
Title: On-Site Implant
Author: TW-D

Uses a "Meterpreter Payload" for remote access via a reverse HTTP.

There are many forms of remote access which may be used by different actors for various purposes. A red team may use remote access techniques that provide persistent access to an exploited target for the purposes of reconnaissance and lateral movement across the network. A systems administrator may use remote access to perform day to day operations on a network accessible computer. An array of techniques exist to obtain and maintain remote access across a network, including using a command and control server such as Cloud C². Common remote access techniques include reverse shells and may employ obfuscation techniques to mask the connection. See all remote access payloads.

This payload is for the Shark Jack — a portable network attack tool. It's a pentesters best friend, optimized for social engineering engagements and opportunistic wired network auditing. Jack into a network an instantly run advanced sysadmin and pentest payloads.

Submit your own payload, or browse more featured Shark Jack Payloads.

 

 

Related Payloads

Evil Portal
Evil Portal
A complete Evil Portal implementation for the WiFi Pineapple Pager, including captive portal detection and credential ca
Read More
Number Guesser
Number Guesser
Pager-safe number guessing game with 5 tries and cheat mode
Read More
Passpoint Scanner
Passpoint Scanner
Scanner for true Passpoint/Hotspot 2.0 networks. Detects Passpoint APs via IE 221 (HS2.0 Vendor Specific OUI 50:6f:9a:10
Read More