RedExt – Browser Extension-Based C2 Framework for Red Team Recon
RedExt 是一个基于 Chrome 浏览器扩展的 C2 框架, 用于红队侦察行动。它通过深色主题仪表盘实现深度数据采集, 具备 Cookie 提取、浏览历史捕获、全页截图等多功能, 并能在受信任环境中隐蔽运行。该工具安装简单, 适用于多种攻击场景, 为防御者敲响警钟。 2025-8-29 15:0:6 Author: www.darknet.org.uk(查看原文) 阅读量:12 收藏

RedExt is a browser extension-based Command and Control (C2) framework designed for authorised red team operations. Built with a Manifest V3 Chrome extension and a Flask-based C2 server, it enables deep browser-level data collection through a dark-themed dashboard. It shifts the implant surface to the browser, a trusted yet under-monitored environment, making interception harder and reconnaissance more discreet.

RedExt - Browser Extension-Based C2 Framework for Red Team Recon

Key Features

  • Cookie extraction with domain filtering supports secure and HttpOnly cookies.
  • Browsing history capture with metadata such as timestamps, titles, and how URLs were accessed.
  • Full-page screenshots, viewport and element-level captures.
  • Real-time clipboard monitoring with source URLs.
  • DOM snapshot with dynamic content and resource mapping.
  • LocalStorage export with domain context.
  • Browser environment profiling, extension enumeration, hardware and network reconnaissance.
  • Bookmark harvesting with folder structure retention.

Installation & Usage

RedExt requires Python and Chrome.

git clone https://github.com/Darkrain2009/RedExt.git

cd RedExt/server

python -m venv venv

source venv/bin/activate

pip install -r requirements.txt

python db_setup.py

python c2_server.py runserver

Load the extension via Chromes Developer mode, or command line:

Load the extension via Chrome’s Developer mode, or command line:

# Windows (PowerShell)

$ExtPath = "C:\path\to\RedExt\ext"

Start-Process "chrome.exe" -ArgumentList "--load-extension=$ExtPath --no-first-run --no-default-browser-check"

Once loaded, the extension registers as an agent on the C2 dashboard. Operators assign tasks like capturing cookies or DOM snapshots, which are stored in a SQLite database for dashboard analysis

Attack Scenario

A red team operator gains browser access, possibly through phishing or lateral movement. They quietly install RedExt as an unpacked extension on the target’s Chrome session. From the Flask dashboard, they harvest browsing history to map employee workflows, capture authentication cookies, screenshot sensitive web apps, and exfiltrate system and clipboard data—all via a tool masquerading as benign browser behaviour.

Red Team Relevance

RedExt turns the browser, a trusted and persistent asset, into a high-fidelity reconnaissance surface. It outpaces traditional remote implants by living inside a core application. Tools like Franco’s Havoc or Cobalt Strike rely on external beacons; RedExt operates where defenders rarely inspect. As such, it offers a fresh offensive angle and urges defenders to monitor suspicious browser extension behavior.

Conclusion

RedExt exemplifies innovation in browser-based implants. By leveraging the browser itself as the implant host, red teams gain stealth and flexibility. For defenders, it highlights a critical blind spot: browser extension monitoring is now essential. RedExt is more than a research toy; it is a practical C2 model that redefines where implants can live and how they can thrive.

You can read more or download RedExt here: https://github.com/Darkrain2009/RedExt


文章来源: https://www.darknet.org.uk/2025/08/redext-browser-extension-based-c2-framework-for-red-team-recon/
如有侵权请联系:admin#unsafe.sh