summary

In this project, a phishing campaign was created using a crafted email with a malicious .iso file attachment. The .iso contained a shortcut that executed a PowerShell-based downloader. The downloader fetched a reverse shell payload generated using msfvenom. A Python web server was used to host the payload, and Netcat was set up to catch the incoming shell. After gaining access, a Command and Control (C2) infrastructure was deployed to maintain persistence on the target system.

Part 1: Pre-Attack Phase (Red Team)


Part 2: Phishing Attack


Part 3: Command and Control (Red Team)