Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Pupy

Pupy

Pupy is an open source, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool.[1] It is written in Python and can be generated as a payload in several different ways (Windows exe, Python file, PowerShell oneliner/file, Linux elf, APK, Rubber Ducky, etc.).[1]Pupy is publicly available on GitHub.[1]

ID: S0192
Type: TOOL
Platforms: Linux, Windows, macOS, Android
Version: 1.3
Created: 18 April 2018
Last Modified: 28 September 2023
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

Pupy can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths.[1]

EnterpriseT1134.001Access Token Manipulation:Token Impersonation/Theft

Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate.[1]

EnterpriseT1087.001Account Discovery:Local Account

Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.[1]

EnterpriseT1557.001Adversary-in-the-Middle:LLMNR/NBT-NS Poisoning and SMB Relay

Pupy can sniff plaintext network credentials and use NBNS Spoofing to poison name services.[1]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Pupy can communicate over HTTP for C2.[1]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

Pupy can compress data with Zip before sending it over C2.[1]

EnterpriseT1123Audio Capture

Pupy can record sound with the microphone.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Pupy adds itself to the startup folder or adds itself to the Registry keySOFTWARE\Microsoft\Windows\CurrentVersion\Run for persistence.[1]

.013Boot or Logon Autostart Execution:XDG Autostart Entries

Pupy can use an XDG Autostart to establish persistence.[2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Pupy has a module for loading and executing PowerShell scripts.[1]

.006Command and Scripting Interpreter:Python

Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts ("scriptlets") to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.[1]

EnterpriseT1136.001Create Account:Local Account

Pupy can user PowerView to execute "net user" commands and create local system accounts.[1]

.002Create Account:Domain Account

Pupy can user PowerView to execute "net user" commands and create domain accounts.[1]

EnterpriseT1543.002Create or Modify System Process:Systemd Service

Pupy can be used to establish persistence using a systemd service.[1]

EnterpriseT1555Credentials from Password Stores

Pupy can use Lazagne for harvesting credentials.[1]

.003Credentials from Web Browsers

Pupy can use Lazagne for harvesting credentials.[1]

EnterpriseT1114.001Email Collection:Local Email Collection

Pupy can interact with a victim’s Outlook session and look through folders and emails.[1]

EnterpriseT1573.002Encrypted Channel:Asymmetric Cryptography

Pupy's default encryption for its C2 communication channel is SSL, but it also has transport options for RSA and AES.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.[1]

EnterpriseT1083File and Directory Discovery

Pupy can walk through directories and recursively search for strings in files.[1]

EnterpriseT1070.001Indicator Removal:Clear Windows Event Logs

Pupy has a module to clear event logs with PowerShell.[1]

EnterpriseT1105Ingress Tool Transfer

Pupy can upload and download to/from a victim machine.[1]

EnterpriseT1056.001Input Capture:Keylogging

Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.[1]

EnterpriseT1046Network Service Discovery

Pupy has a built-in module for port scanning.[1]

EnterpriseT1135Network Share Discovery

Pupy can list local and remote shared drives and folders over SMB.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

Pupy can execute Lazagne as well asMimikatz using PowerShell.[1]

.004OS Credential Dumping:LSA Secrets

Pupy can use Lazagne for harvesting credentials.[1]

.005OS Credential Dumping:Cached Domain Credentials

Pupy can use Lazagne for harvesting credentials.[1]

EnterpriseT1057Process Discovery

Pupy can list the running processes and get the process ID and parent process’s ID.[1]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Pupy can migrate into another process using reflective DLL injection.[1]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.[1]

EnterpriseT1113Screen Capture

Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.[1]

EnterpriseT1082System Information Discovery

Pupy can grab a system’s information including the OS version, architecture, etc.[1]

EnterpriseT1016System Network Configuration Discovery

Pupy has built in commands to identify a host’s IP address and find out other network configuration settings by viewing connected sessions.[1]

EnterpriseT1049System Network Connections Discovery

Pupy has a built-in utility command fornetstat, can do net session through PowerView, and has an interactive shell which can be used to discover additional information.[1]

EnterpriseT1033System Owner/User Discovery

Pupy can enumerate local information for Linux hosts and find currently logged on users for Windows hosts.[1]

EnterpriseT1569.002System Services:Service Execution

Pupy usesPsExec to execute a payload or commands on a remote host.[1]

EnterpriseT1552.001Unsecured Credentials:Credentials In Files

Pupy can use Lazagne for harvesting credentials.[1]

EnterpriseT1550.003Use Alternate Authentication Material:Pass the Ticket

Pupy can also perform pass-the-ticket.[1]

EnterpriseT1125Video Capture

Pupy can access a connected webcam and capture pictures.[1]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.[1]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp