theAwful
  • Introduction
  • INTERNALS
    • Responder
      • NBNS/LLMNR
    • mitm6
    • Password Spraying
    • CME/NXC Cheatsheet
    • Kerberoasting
    • AS-REP Roasting
    • Dumping NTDS
  • Metasploit Payload and Listener
    • Encoder
    • Word Macros
    • Payloads
      • Earlybird
    • Metasploit Modules
  • OSEP Cheat Sheet
  • OSEP Challenges
    • Challenge 6
  • C2
    • Sliver
  • Privilege Escalation
    • PowerUp
    • Privilege Escalation
      • Internal Privilege Escalation (Linux)
  • Windows Local Recon
    • SQL Server
    • Application Whitelisting and Credentials
  • Linux Local Recon
  • File Transfer & Execution
  • Phishing
  • Ansible/Jfrog
  • Pivoting
  • Pass-the-hash
  • Remote Access
  • Post-Exploitation
    • Add User
    • AMSI, CLM, AppLocker
  • Credentials
  • Lateral Movement
  • Domain Enumeration
    • Users and Computers
    • ACLs
    • BloodHound
    • GPO
    • Trusts
    • User Hunting
  • Active Directory
    • Domain Recon - Kali
    • Domain Recon - Windows
    • Trusts
    • ADCS
      • ESC3
  • Web Application Testing
    • Host Headers
    • WAF Bypasses
    • Template Injection
    • Prototype Pollution
      • Client-side Prototype Pollution
    • Autorize
    • SQLmap
    • SSRF
    • File Uploads
    • Command Injection
    • XXE
      • Blind XXE
    • CSRF
    • XSS
      • XSS Methodology
      • Bypass WAF
  • MOBILE APPS
    • iOS
      • Install Tools
      • SSL Killswitch
    • Android
      • Install Tools
      • Setting up Burp
      • Red Teaming
  • Exploit Dev
    • AMSI Bypass
      • AMSI OpenSession
      • AMSI ScanBuffer
    • VBA Obfsu
    • APC Injection
    • EarlyBird Injection
  • DFIR
    • Malware Analysis
    • Memory Analysis
      • Volatility
    • Registry Analysis
      • RegRipper
    • Behavior Analysis
      • ShellBags
      • UserAssist
    • Filesystems
  • VISUAL STUDIO
    • Tricks
  • Scripts and Tools
    • Grep IPs from DNS ping
    • OSINT.sh
Powered by GitBook
On this page
  • The Ghost Framework
  • Features
  • Installation
  • Usage
  1. MOBILE APPS
  2. Android

Red Teaming

The Ghost Framework

The Ghost Framework is a powerful post-exploitation tool for Android devices, providing a suite of features for remote control and manipulation. This tool is useful for red teaming and penetration testing, allowing security professionals to interact with and control compromised Android devices.

Features

  1. Remote Shell:

    • Obtain a command-line interface on the target device, enabling you to execute commands and interact with the system.

  2. File Management:

    • Upload and download files between the target device and your local machine.

  3. Application Management:

    • Install, uninstall, and interact with applications on the target device.

  4. Device Information:

    • Retrieve information about the device, such as system details and installed applications.

  5. Interactive Sessions:

    • Manage multiple sessions and interact with different devices simultaneously.

Installation

Requirements

  • Python 2.7 or 3.x

  • Pip (Python package installer)

Steps to Install

  1. Clone the Repository:

    • Download the Ghost Framework from GitHub:

      git clone https://github.com/entynetproject/ghost.git
  2. Navigate to the Directory:

    • Change to the Ghost Framework directory:

      cd ghost
  3. Install Dependencies:

    • Use pip to install required Python packages:

      pip install -r requirements.txt

Usage

Starting the Ghost Server

  1. Launch the Server:

    • Run the Ghost server to start listening for incoming connections from the target devices:

      python ghost.py
  2. Configure the Server:

    • By default, the server listens on port 8080. You can configure it by editing the ghost.py file or by specifying command-line options if supported.

Connecting to a Target Device

  1. Deploy the Ghost Agent:

    • To interact with a target device, deploy the Ghost agent (typically an APK) to the device. This can be done using a variety of methods such as sending the APK via email, using social engineering, or manually installing it.

  2. Start the Agent on the Device:

    • Once installed, open the Ghost agent on the target device to establish a connection with the Ghost server running on your machine.

Basic Commands and Operations

Once connected, you can use various commands to interact with the target device. Below are some common commands:

Remote Shell

  • Open a Shell:

    shell
PreviousSetting up BurpNextAMSI Bypass

Last updated 9 months ago