• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

WindowSpy: Automatically monitor victims on Cobalt Strike

AnonyViet by AnonyViet
January 9, 2024
in Security
0

If you have learned about hacking tools like metasploit, nmap or brute force, you have probably heard about Cobalt Strike. In short, this is a tool to help penetrate and control the victim's computer. But you can also monitor the victim's behavior by taking screenshots to see what they are doing. However, you cannot always track them, so in this article I will introduce to you the WindowSpy tool, which helps you automatically capture the victim's screen when detecting sensitive information.

Join the channel Telegram belong to AnonyViet 👉 Link 👈

WindowSpy: Automatically monitor victims on Cobalt Strike

What is Cobalt Strike?

Cobalt Strike is a framework used in penetration testing (pentest) for red teams (attack teams). Hackers can use Cobalt Strike to create beacons that act as direct links into the victim's computer's network. From here, hackers can remotely access the victim's machine to control and execute malicious commands and scripts.

The original purpose of Cobalt Strike was a tool for red teams, but cracked versions appeared, causing this tool to fall into the hands of hackers who specialize in attacking and sabotaging public systems. Often, hackers will scan TCP ports 1433 to find MS-SQL servers and brute force the sa account, which is the MS-SQL system administrator account. They will then create a command shell using cmd.exe or powershell.exe through the sqlservr.exe process and execute Cobalt Strike's payload.

What is WindowSpy?

WindowSpy is the Object Beacon file in Cobalt Strike used to monitor victims. WindowSpy will only be activated when the victim performs certain actions such as logging in on the browser, opening sensitive documents, logging in to vpn, etc. The purpose of WindowSpy is to increase invisibility during monitoring. victims by not having to repeat actions like taking screenshots. It also saves the red team time in filtering out a lot of unnecessary information, for example, if you only need to know Facebook login information, you can configure to only take screenshots when users access Facebook's home page. .

Every time beacons check, BOF (Beacon Object Files) will run on the target's machine. BOF has a list of common window titles, such as login, admin, control panel, vpn, etc. You can customize this list and recompile it yourself. It lists the visible windows and compares the window titles with the above list and if the window name is in the list, it triggers the intruder function in WindowSpy.cna called spy(). By default, it will take screenshots. You can customize the functionality of this function as you want, for example keylogging, WireTap, webcam,…

How to use WindowSpy

Step 1: You implant beacons into the victim's computer. If you don't know how to transplant, do it Read this article again.

WindowSpy: Automatically monitor victims on Cobalt Strike 13

Step 2: Download WindowSpy with the command below:

git clone https://github.com/CodeXTF2/WindowSpy.git

Step 3: Open Script Console.WindowSpy: Automatically monitor victims on Cobalt Strike 14

Step 4: Load the file WindowSpy.cna with the command:

If you have learned about hacking tools like metasploit, nmap or brute force, you have probably heard about Cobalt Strike. In short, this is a tool to help penetrate and control the victim's computer. But you can also monitor the victim's behavior by taking screenshots to see what they are doing. However, you cannot always track them, so in this article I will introduce to you the WindowSpy tool, which helps you automatically capture the victim's screen when detecting sensitive information.

WindowSpy: Automatically monitor victims on Cobalt Strike 15

What is Cobalt Strike?

Cobalt Strike is a framework used in penetration testing (pentest) for red teams (attack teams). Hackers can use Cobalt Strike to create beacons that act as direct links into the victim's computer's network. From here, hackers can remotely access the victim's machine to control and execute malicious commands and scripts.

The original purpose of Cobalt Strike was a tool for red teams, but cracked versions appeared, causing this tool to fall into the hands of hackers who specialize in attacking and sabotaging public systems. Often, hackers will scan TCP ports 1433 to find MS-SQL servers and brute force the sa account, which is the MS-SQL system administrator account. They will then create a command shell using cmd.exe or powershell.exe through the sqlservr.exe process and execute Cobalt Strike's payload.

What is WindowSpy?

WindowSpy is the Object Beacon file in Cobalt Strike used to monitor victims. WindowSpy will only be activated when the victim performs certain actions such as logging in on the browser, opening sensitive documents, logging in to vpn, etc. The purpose of WindowSpy is to increase invisibility during monitoring. victims by not having to repeat actions like taking screenshots. It also saves the red team time in filtering out a lot of unnecessary information, for example, if you only need to know Facebook login information, you can configure to only take screenshots when users access Facebook's home page. .

Every time beacons check, BOF (Beacon Object Files) will run on the target's machine. BOF has a list of common window titles, such as login, admin, control panel, vpn, etc. You can customize this list and recompile it yourself. It lists the visible windows and compares the window titles with the above list and if the window name is in the list, it triggers the intruder function in WindowSpy.cna called spy(). By default, it will take screenshots. You can customize the functionality of this function as you want, for example keylogging, WireTap, webcam,…

How to use WindowSpy

Step 1: You implant beacons into the victim's computer. If you don't know how to transplant, do it Read this article again.

WindowSpy: Automatically monitor victims on Cobalt Strike 13

Step 2: Download WindowSpy with the command below:

git clone https://github.com/CodeXTF2/WindowSpy.git

Step 3: Open Script Console.WindowSpy: Automatically monitor victims on Cobalt Strike 14

Step 4: Load the file WindowSpy.cna with the command below. The WindowSpy.cna file will be located in the BOF folder.

load <Đường dẫn đến file WindowSpy.cna>

WindowSpy: Automatically monitor victims on Cobalt Strike 18

That's it, WindowSpy will automatically detect and capture the window screen of the victim's computer. For example, on the victim's computer, I will open 2 windows as shown below.

WindowSpy: Automatically monitor victims on Cobalt Strike 19

WindowSpy will detect these two windows and compare the window's title with the list file available in the tool. If it matches, a screenshot will be taken.

WindowSpy: Automatically monitor victims on Cobalt Strike 20

You find screenshots in the Screenshots folder of Server Cobalt Strike.

WindowSpy: Automatically monitor victims on Cobalt Strike 21

I only set up a lab to illustrate the tool, so it will be much different from the real environment.

The article scored: 5/5 – (100 votes)

Tags: AutomaticallyCobaltMonitorStrikevictimsWindowSpy
Previous Post

How Hackers Bypass AV Infiltrate Windows with Autoit

Next Post

Tran Quoc Viet – Enthusiastic Technical Specialist at HALEDCO

AnonyViet

AnonyViet

Related Posts

How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Next Post
Tran Quoc Viet – Enthusiastic Technical Specialist at HALEDCO

Tran Quoc Viet - Enthusiastic Technical Specialist at HALEDCO

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

How to view web access history in the anonymous mode (Incognito) of Chrome

How to view web access history in the anonymous mode (Incognito) of Chrome

August 22, 2025
How to automatically erase the web history after escaping to absolutely secure

How to automatically erase the web history after escaping to absolutely secure

August 22, 2025
Stainless steel flange price list at Asia Industry

Stainless steel flange price list at Asia Industry

August 21, 2025

Hướng Dẫn Đăng Nhập VN88

August 21, 2025
How to view web access history in the anonymous mode (Incognito) of Chrome

How to view web access history in the anonymous mode (Incognito) of Chrome

August 22, 2025
How to automatically erase the web history after escaping to absolutely secure

How to automatically erase the web history after escaping to absolutely secure

August 22, 2025
Stainless steel flange price list at Asia Industry

Stainless steel flange price list at Asia Industry

August 21, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

How to view web access history in the anonymous mode (Incognito) of Chrome

How to view web access history in the anonymous mode (Incognito) of Chrome

August 22, 2025
How to automatically erase the web history after escaping to absolutely secure

How to automatically erase the web history after escaping to absolutely secure

August 22, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply