Command and Control with Pupy

Learn how to use the Pupy server to connect to exploited clients over different encryption protocols and use these sessions to run additional attacks, dump credentials, and collect information.
Course info
Level
Intermediate
Updated
Sep 25, 2020
Duration
25m
Table of contents
Description
Course info
Level
Intermediate
Updated
Sep 25, 2020
Duration
25m
Description

Are you looking for a tool that can help you manage your target workstations after you exploited them? In this course, Command and Control with Pupy, you will gain the ability to manage target sessions, collect information, and run additional attacks from a single interface. First, you will learn how to generate client files in Pupy. Next, you will discover how to use different encryption protocols in Pupy. Finally, you will explore how to capture information from targets using Pupy. When you are finished with this course, you will have the skills and knowledge needed to manage exploited targets with Pupy.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Lateral Movement with WMIOps
Intermediate
24m
Sep 25, 2020
Lateral Movement with PsExec
Intermediate
21m
Sep 25, 2020
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Tool Introduction
Hello, I'm Matt Glass, and welcome to this cybersecurity tools course featuring Pupy, an open‑source command and control tool with many other features for further exploiting your targets. Once you've exploited a few vulnerabilities and gained access, you may be wondering if there's an easier way to manage multiple sessions simultaneously. You may also be looking for a way to encrypt your traffic to make it appear legitimate while you download files and take screenshots of your targets. Well, if that's what you're looking for, Pupy might be the right tool for you. Pupy generates client files capable of connecting to a server over multiple encryption methods, enabling you to avoid detection while you continue to take further actions against your targets. Pupy can easily manage multiple target sessions and carry out additional attacks with built‑in tools to escalate privileges, download files, take screenshots, and dump credentials. If you're ready to learn how Pupy can help you manage your targets, then let's get started with this course on Command and Control with Pupy.