Young hacker smiling

We hack your software

zero false positives

Attacking Applications, APIs, Mobile Apps Servers, Networks, IoT Devices
ICS: Industrial Control System
SOC: Security Operations Center

Commands

Cyberweapon developed completely by Fluid Attacks for in depth penetration of work stations and critical servers during the Pentests where its use is authorized in our One-Shot Hacking Service.

Purpose

We are not only interested in finding a vulnerability but also showing the client the pottential risks it implies and the direct impact it has on the business. To do this, we look to take full control of multiple critical systems in order to create a network of infected nodes and be able to control them to obtain sensitive information or further infect other nodes.

Botnet
Image taken from Cloudflare
How we do it

How we do it

In order to be able to use FLUIDCommands we first need administrative access to the vulnerable system, this we achieve through the manual tests that our experts execute. Once administrative access is obtained we can proceed to remotely infect the machine. With the first machine compromised and under our control we can now expand and infect other connected nodes or focus on the machine at hand and do an in-depth search in look of sensitive information or new and bigger attack vectors.

Zero Collateral Damage

It is important to note that the commands cyberweapon is never installed on the vulnerable system as a service nor an automatic running task. Once all tests have concluded it is remotely uninstalled without leaving any traces or collateral damage.

Zero Damage
Command and Control Center
Image taken from Darpa

Command and Control Center

FLUIDCommands counts with a Command and Control Center from which we can send orders/commands to our botnet of infected nodes. The Command and Control Center communicates with all infected nodes through a reverse proxy using ICMP giving us always have full control over our cyberweapon. Having only one node infected, commands can remotely spread to neighbouring systems.

Capture Feature

  • Screen Shot: Through the scr command we can take a screen capture of the infected machine without alerting the victim.

  • Audio capture: Using the mic command we can open you microphone and capture live audio.

  • Keylogger: The keylog command allows us to capture and log all your keyboard strokes in order to obtain sensitive data such as credentials or credit card info.

Screen shot
Command execution

exec Feature

This feature allows us to remotely execute any command available through cmd on the infected machine.

echo Feature

This command is used to test the connection and assure we have control of the infected node. It echos back whatever we pass to it.

echo
AntiVirus Evasion

Detection Evasion

Our cyberweapon avoids being detected by all AntiX and SOC controls by masking all requests and commands under a familiar and trusted protocol.


Service status - Terms of Use