Skip to content

C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.

License

Notifications You must be signed in to change notification settings

cxnturi0n/convoC2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

convoC2

Table of Contents

Introduction

Command and Control infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
It infiltrates data into hidden span tags in Microsoft Teams messages and exfiltrates command outputs in Adaptive Cards image URLs, triggering out-of-bound requests to a C2 server.
The lack of direct communication between the victim and the attacker, combined with the fact that the victim only sends http requests to Microsoft servers and antiviruses don't look into MS Teams log files, makes detection more difficult.

convoC2-Architecture

Demo

The following video demonstrates the use of the server to control two compromised hosts: one running the new Teams on Windows 11 and the other running the old Teams on Windows 10. In the first case, the attacker is not in the same org as the victim.

ConvoC2_Demo.mp4

Note: In the first case the victim already accepted the chat with the external attacker, but in a real scenario where the attacker starts the chat with the victim for the first time, the victim would need to confirm the chat with the attacker (although this alert message can be easily bypassed, see here). This is not a problem: because messages are being cached in the log file anyways, the commands are received and executed even if the victim has not visualized or accepted the chat yet.

Usage

Server

wget https://github.com/cxnturi0n/convoC2/releases/download/v0.1.0-alpha/convoC2_server_amd64.tar.gz
tar -xzvf convoC2_server_amd64.tar.gz --one-top-level
root@convoC2-server-VPS:~# ./convoC2_server_amd64 -h
Usage of convoC2 server:
  -t, --msgTimeout  How much to wait for command output (default 30 s)
  -b, --bindIp      Bind IP address (default 0.0.0.0)

Agent

wget https://github.com/cxnturi0n/convoC2/releases/download/v0.1.0-alpha/convoC2_agent.tar.gz
tar -xzvf convoC2_agent.tar.gz --one-top-level
C:\Windows>convoC2_agent.exe -h
Usage of convoC2 agent:
  -v, --verbose   Verbose logging (default false)
  -s, --server    C2 server URL (i.e. http://10.11.12.13/)
  -t, --timeout   Teams log file polling timeout [s] (default 1)
  -w, --webhook   Teams Webhook POST URL
  -r, --regex     Regex to match command (default "<span[^>]*aria-label=\"([^\"]*)\"[^>]*></span>")

Requirements

To get it working, you will need to set up a few things:

  • Create Teams channel with Workflow Incoming Webhook: this is the place where the adaptive cards containing the output will be received. It is important to keep a browser window with this channel opened while using the server, otherwise the server will not receive messages from the agents.

WebhookChannel

  • Fetch Ids and Auth Token: Teams initializes a chat with a POST to https://teams.microsoft.com/api/chatsvc/emea/v1/threads with the unique ids of the victim and the attacker in the body. In the response, the threadId will be returned in the path of the Location header url. The Bearer token of the same request is used to authenticate to https://teams.microsoft.com/api/chatsvc/emea/v1/users/ME/conversations/<threadId>/messages, which is the endpoint for sending messages. So we just need to grab these three things and the server will take care of the rest.
  • Make sure you have a public facing host allowing inbound HTTP traffic on port 80.
  • Teams needs to be running on the victim host, in the background is fine too.

After starting the server you can receive new agents and control them, using the data previously obtained for authentication. Check the demo out for a usage example.

Create Teams channel with Workflow Incoming Webhook

First of all, you will need to create a Teams channel.

CreateTeams

Right click on the three dots, then click on "Workflows".

CreateTeams_1

In the search bar type "Webhook" and click on the "Post to a channel when a webhook request is received".

CreateTeams_5

Continue with the default settings and finally copy the url.

Create_Teams_6

Fetch Ids and Auth Token

Start by looking for the victim.

GetOrgIds

After selecting the victim account, with the web proxy intercepting the requests, you can send a dummy message.

GetOrgIds_1

Save the two ids present in the api/chatsvc/emea/v1/threads request then DROP the request. The auth token will be the Bearer token of the same request.

GetOrgIds_2

Inspiration

This infrastructure was inspired by the Teams GIFShell research made by Bobbyrsec.
Initially my purpose was to replicate the issue, but the solution appeared to be partially fixed. The research involved injecting commands into Base64-encoded GIFs, but these were no longer being displayed correctly: an icon of corrupted image would appear in the chat instead, resulting in the victim protentially starting to suspect.
After testing various methods, I noticed that it was possible to embed commands directly into messages rather than in GIFs or images: sending multiple images is more likely to raise suspicion compared to sending simple messages, right? Initially I considered embedding commands in tags like <script>, <meta>, or custom tags, but all were filtered out. Eventually, embedding commands in the aria-label attribute of <span> tags with display:none was successful: the victim would only see the message, but the hidden command would actually poison the Teams log file.

TeamsLogPoisoning

The server TUI has been developed using the awesome Go BubbleTea framework.

Contribute

If you find bugs or want to improve the project feel free to open a pull request and I will be glad to review and eventually merge your changes. Short term todos are:

  • Message AES encryption
  • Keepalive to detect when agent is dead
  • Powershell version of the Agent

About

C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published