Skip to content

connor1733/capstone

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Capstone

Created by Patrick Casey, Alex Guerriero and Connor Reardon

Things TODO

Stage 1 Chrome Exploit

  • Get stage 1 exploit working on chrome browser on x86-64 linux machine (only works on the javascript shell as of now) difficulty -> easyish
  • Compile Chrome for ARM
  • Compile d8 for ARM and test exploit on d8 shell
  • Get stage 1 exploit working on chrome browser on actual arm phone (shell then browser) difficulty -> medium

Stage 2 Kernel Exploit

  • Find vulnerable kernel version for CVE-2019-2181 difficulty -> easyish
  • Compile it for arm android difficulty -> easy
  • Get it on the phone difficulty -> mediumish?
  • Write/take exploit to get it working from adb shell difficulty -> easy/medium/hard <- depends on what you want
  • Take working exploit and get it working from chrome difficulty -> medium/hard

Android Implant

  • Set up a dummy native binary for android
  • Compile openssl library to do encryption
  • Ninja stuff
  • Exfil data

C2 Server

  • Listen for phone and send exploit file
  • Listen again and send implant
  • Pull encrypted data
  • Undo the encryption, leaving raw WhatsApp database
  • Parse WhatsApp database for messages
  • Move C2 infrastructure off of localhost to an accessible IP address, craft link to the C2

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •