Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Latest commit

 

History

History
History
36 lines (24 loc) · 1.96 KB

File metadata and controls

36 lines (24 loc) · 1.96 KB
Copy raw file
Download raw file
Outline
Edit and raw actions
As mentioned at the HOPE conference 2018

This repo is apart of the warmind project for a clone of the code see here or you can get the code from here. For a version you can download with curl/wget see here.

Scenario

Post exploitation tools are far and in between, they are used after you have successfully exploited a system and need to either;

  • Do some things, pull hashes, ip addresses, etc.
  • Map the network
  • Anything that has to do with being on the network itself that you don't want to be caught doing

What soa.py does is create a sort of container that will host a root terminal shell while the log files are being monitored (default logs: /var/log). After you have completed your session, the log files are scrubbed back to the second soa.py was launched.

Commands

Soapy has a few available commands for you to pass:

usage: sudo soa.py [-n|-l|-d] PATH|DIR1 DIR2 ...

optional arguments:
  -h, --help            show this help message and exit
  -l PATH, --log PATH   pass the path to log files (*default=/var/log)
  -d DIR1 DIR2 ... [DIR1 DIR2 ... ...], --dirs DIR1 DIR2 ... [DIR1 DIR2 ... ...]
                        provide directories that you want files deleted out of
                        afterwards (*default=None)
  -n, --no-prompt       delete the files in the provided directory without
                        prompting for deletion (*default=raw_input)

Demo video

soapdemo

Morty Proxy This is a proxified and sanitized view of the page, visit original site.