PoC for an SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers.
This is not a complete C2 but rather a simple Proof of Concept for executing commands remotely over SMS.
For the shell to work you need to devices capable of sending SMS. The victim’s computer should be equiped with WWAN module with either a physical SIM or eSIM deployed.
On the operator’s end, two tools are provided:
- .NET binary which uses an embedded WWAN module
- Python script which uses an external Huaweu MiFi thourgh its API
Of course, you could in theory use any online SMS provider on the operator’s end via their API.
On the victim simply execute the
client-agent.exe binary. If the agent is compiled as a
Console Application you should see some verbose messages. If it’s compiled as a
Windows Application (best for real engagements), there will be no GUI.
The operator must specify the victim’s phone number as a parameter:
Whereas if you use the python script you must additionally specify the MiFi details:
python3 server-console.py --mifi-ip 192.168.0.1 --mifi-username admin --mifi-password 12345678 --number +306912345678 -v
A demo as presented by Markus at Offensive is shown below. On the left is the operator’s VM with a MiFi attached, whereas on the right window is client agent.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.