TrevorC2 is command and control framework. It
is client/server model which works through a browser masquerading as C2 tool.
It works on different time intervals which makes it almost impossible to be
detected. This tool is coded in python but it’s also compatible with c#, PowerShell,
or any other platform. this is supported by both windows and MacOS along with Linux.
It is very easy and convenient to use.
You can download it from: https://github.com/trustedsec/trevorc2
Once its downloaded, open the folder and then
open trevorc2_server.py file and
change the IP to your local host IP as shown in the image below. Also, provide
the site that will be cloned to the trevorc2 server.
Then, start and run trevorc2 framework.
Once the trevorc2 is up and running, change the
IP to your local host IP in trevorcs.ps1
file.
Then send this file to the victim using any desired
social engineering method. Once the file is executed by the victim, you will
have your session as shown in the image below :
To see the sessions type :
list
And to access this session type :
interact
0 comments:
Post a Comment