Skip to content

Latest commit

 

History

History
25 lines (21 loc) · 1.58 KB

File metadata and controls

25 lines (21 loc) · 1.58 KB

WOC-Ransomware

picture alt

SET UP LOACALLY

  • Clone the repo, cd into it and run ./run.sh.
  • The attacker needs to run python klAttacker.py and wait for victim to run the script.
  • A Server awaits the victim to run run.sh and starts communication with the victim via socket once connected.
  • If we run ./run.sh the Test_dir is encrypted and a gui pops up asking for path to private key.
  • To decrypt it enter privateKey and hit decrypt.

PROGRESS

                                 INFOSEC'S WOC RANSOMWARE PROJECT
              +---------------------------------------------------------------------
              |  WEEK  |  STATUS  |                 DESCRIPTION                    |
              ----------------------------------------------------------------------
              | WEEK 1 |    🟢    |      AES, RSA encryption and basic GUI         |
              ----------------------------------------------------------------------
              | WEEK 2 |    🟢    |            A Script for Windows                |
              ----------------------------------------------------------------------
              | WEEK 3 |    🔴    |         Obfuscation, cryptomining              |
              ----------------------------------------------------------------------
              | WEEK 4 |    🟢    |              Piece it Together                 |
              ----------------------------------------------------------------------