Empire3
Empire is fully supported by BC-Security
Last updated
Empire is fully supported by BC-Security
Last updated
Demo of Empire with Starkiller is in this Red Team Village event video where I emulate APT19:
Install on Kali:
Install on Ubuntu:
If you are installing the newer version of Empire on the SANS Slingshot C2 Matrix Edition VM, there is a small bug because it wants Ubuntu 20.04 but slingshot is in 18.04. Replace the line in setup/install.sh with the correct version:
wget -q
https://packages.microsoft.com/config/ubuntu/18.04/packages-microsoft-prod.deb
And comment the version test:
#if [ $VERSION_ID != "20.04" ]; then # echo -e '\x1b[1;31m[!] Ubuntu must be 20.04\x1b[0m' && exit #fi
Download Starkiller if you want a GUI:
On Kali:
Run Empire for connectivity through Starkiller if you want a GUI:
Open Starkiller:
Login to Starkiller:
Name: localhost:1337
Username: <user>
Password: <password>
Will use an adversary emulation plan for APT19 as an example: https://www.scythe.io/library/threatthursday-apt19
Tactic | Description |
Description | APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services. |
Goal and Intent | Exist in the network to enumerate systems and information in order to maintain Command and Control to support future attacks. |
Command and Control | Commonly Used Port (T1043) - TCP port 80; Standard Application Layer Protocol (T1071) - HTTP; Deobfuscate/Decode Files or Information (T1140); Data Encoding (T1132) - used Base64 to encode communications to the C2 server |
Initial Access | Spearphishing attachment (T1193); Spearphishing link (T1192) |
Execution | PowerShell (T1086); User Execution; Hidden Windows (T1143) - used |
Discover | System Owner/User Discovery (T1033); System Information Discovery (T1082) System Network Configuration Discovery (T1016) |
Persistence | Registry Run Keys/ Start up Folder (T1060) - establishes persistence by setting the Registry key |
Defense Evasion | Regsvr32 (T1117); Scripting (T1064) - downloaded and launched code within a SCT file to bypass application whitelisting techniques |
Create Listener
Generate Stager HTA:
Generate Stager SCT:
Generate Stager DLL:
Download the stagers to /tmp and serve with SimpleHTTPServer
Email with link to Resume.hta
Show execution of HTA file:
Migrate to another process with reflective PE Injection: https://www.bc-security.org/post/reflective-pe-injection-in-windows-10-1909/
Open regedit HKCU\Software\Microsoft\Windows\CurrentVersion
Execution with regsvr32 and scripting. Created a shortcut called Chrome with Target set as:
Using Empire with Starkiller: How to from BC-Security