Forgottenhell Mac OS

broken image


Introduction

EggShell is an iOS/macOS and Linux post exploitation surveillance pentesting tool written in Python. With EggShell you'll be able to:

Forgottenhell Mac OS

Killing Floor was initially released as an Unreal Tournament 2004 total conversion mod in 2005 and was later released as a retail version on May 14th, 2009 for Windows, May 5th 2010 for Mac OS X and Linux in November of 2012. Killing Floor 2 was announced on May 8th 2014. After the Linux version launched, all non-Steam servers were closed and the game became Steam exclusive. Before enrolling your Mac, please make sure you don't have an existing MDM on your device. Check for this by visiting System Preferences → Profiles. If you don't see an item for Profiles, you're ready to proceed. If you do, you may need to find your existing management MDM and remove it, by selecting it and clicking the minus button like so. How To Password Protect a Folder on Mac OS X El Capitan. Encrypt and Password Protect an Existing Folder Using the All New Disk Utility in El Capitan.

  • upload/download files, take pictures, track location, execute shell command, retrieve passwords, and much more.
This is project is a proof of concept, intended for use on machines you own.

EggShell: Post Exploitation Surveillance Tool

Hart of your world mac os. This remote administration tool provides a command line session with additional functionality between you and target machine. EggShell comes packed with a wide variety of features.

Features:

Forgotten Hell Mac Os Update

  • Tab completion,
  • File manipulation (upload/download/delete, etc.),
  • Full camera and microphone control,
  • Location Tracking,
  • Shell command execution,
  • Persistence,
  • Escalating privileges,
  • Tacking Pictures,
  • Password Retrieval,
  • iTunes/iMessages manipulation, etc.
* Server communication features end to end encryption with 128 bit AES and the ability to handle multiple clients.

EggShell Install

Mac Os Catalina

Requirements:

  • python 2.7

Clone it from the Githhub.

MacOS/Linux:

iOS (Jailbroken Only):

  • Add Cydia source: http://lucasjackson.io/repo
  • Install EggShell 3
  • Run the command eggshell (use any mobile terminal application)

Payloads

Eggshell payloads are executed on the target machine. After we retrieve device details, server will establish a secure remote control session. There are 2 different payload options:

  • bash
  • Teensy (macOS)
bash: If you select a payload in bash (shell script), you'll be prompted to enter your EggShell server IP address and port the payload will connect back to. A payload shell script will then be generated on the terminal screen.
Teensy (macOS): If you select a Teensy payload, you will be prompted to enter your EggShell server IP address and port the payload will connect back to. An Arduino based payload for the teensy board will then be generated for you in the folder teensy_macOS relative from where you ran EggShell.

Mac Os Download

Sessions

After a session is established, you can execute commands on that device through the EggShell command line interface. Type help to show all available commands.

Multihandler

Forgotten Hell Mac Os Catalina

Multihandler option allow us to handle multiple sessions. You can also show Multihandler commands (similar to the sessions), just type help.

Taking Pictures/Recording Audio

Both iOS and macOS sessions support taking pictures and recording audio.

Taking pictures:

  • macOS: (picture command) takes a picture through the front facing iSight camera,
  • iOS: requires 1 argument specifying ‘front' or ‘back' facing camera.

Recording audio:

  • When it came to recording audio, the process is same for both iOS and macOS. The argument for this command will specify the record or stop action. Recording will run in the background, so you'll be able to execute additional commands during the recording. When the recording is finished, the file will be downloaded and saved.

To see detailed EggShell feature explanation, click the documentation link bellow.

Commands

macOS:

  • brightness : adjust screen brightness
  • cd : change directory
  • download : download file
  • getfacebook : retrieve facebook session cookies
  • getpaste : pasteboard contents
  • getvol : get speaker output volume
  • idletime : get the amount of time since the keyboard/cursor were touched
  • imessage : send message through the messages app
  • itunes : iTunes Controller
  • keyboard : your keyboard -> is target's keyboard
  • lazagne : firefox password retrieval
  • ls : list contents of a directory
  • mic : record mic
  • persistence : attempts to re establish connection after close
  • picture : take picture through iSight
  • pid : get process id
  • prompt : prompt user to type password
  • screenshot : take screenshot
  • setvol : set output volume
  • sleep : put device into sleep mode
  • su : su login
  • suspend : suspend current session (goes back to login screen)
  • upload : upload file

Linux:

  • cd : change directory
  • download : download file
  • ls : list contents of a directory
  • pid : get process id
  • pwd : show current directory
  • upload : upload file

iOS:

  • alert : make alert show up on device
  • battery : get battery level
  • bundleids : list bundle identifiers
  • cd : change directory
  • dhome : simulate a double home button press
  • dial : dial a phone number
  • download : download file
  • getcontacts : gets addressbook
  • getnotes : download notes
  • getpasscode : retreive the device passcode
  • getsms : download SMS
  • getvol : get volume level
  • home : simulate a home button press
  • installpro : install substrate commands
  • ipod : control music player
  • islocked : check if the device is locked
  • lastapp : get last opened application
  • locate : get device location coordinates
  • locationservice: toggle location services
  • lock : simulate a lock button press
  • ls : list contents of a directory
  • mic : record mic
  • mute : update and view mute status
  • open : open apps
  • openurl : open url on device
  • persistence : attempts to re establish connection after close
  • picture : take picture through the front or back camera
  • pid : get process id
  • respring : restart springboard
  • safemode : put device into safe mode
  • say : text to speach
  • setvol : set device volume
  • sysinfo : view system information
  • upload : upload file
  • vibrate : vibrate device

You may also like:

Post-exploitation Agent – SILENTTRINITY [Python, IronPython, C#/.NET]
Build Your Own Botnet – BYOB
Remot3d: An Simple Exploit for PHP Language
[blind-gamers] Entombed questionMichael Law
  • Re: [blind-gamers] Entombed questionjohn
  • Re: [blind-gamers] Entombed questionPatrick Smyth
  • Re: [blind-gamers] Entombed questionRon Schamerhorn
  • Re: [blind-gamers] Entombed questionDakotah Rickard
  • Re: [blind-gamers] Entombed questionRon Schamerhorn
  • Re: [blind-gamers] Entombed questionMichael Law
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionPaul Lemm
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionPaul Lemm
  • Re: [blind-gamers] Entombed questionjohn
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionjohn
  • Re: [blind-gamers] Entombed questionPaul Lemm
  • Re: [blind-gamers] Entombed questionenes sarıbaş
  • Re: [blind-gamers] Entombed questionMichael Law
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionMichael Law
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionMichael
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionRon Schamerhorn
  • Re: [blind-gamers] Entombed questionRichard Sherman
  • Re: [blind-gamers] Entombed questionenes sarıbaş
  • Re: [blind-gamers] Entombed questionenes sarıbaş
  • Re: [blind-gamers] Entombed questionRon Schamerhorn




broken image