博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
FakeImageExploiter v1.3
阅读量:6794 次
发布时间:2019-06-26

本文共 5022 字,大约阅读时间需要 16 分钟。

FakeImageExploiter v1.3

FakeImageExploiter v1.3 - backdoor images.jpg[.ps1]

CodeName: MetamorphosisVersion release: v1.3 (Stable)Author: pedro ubuntu [ r00t-3xp10it ]Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OSSuspicious-Shell-Activity (SSA) RedTeam develop @2017
The author does not hold any responsibility for the bad use of this tool,remember that attacking targets without prior consent is illegal and punished by law.

Description:

This module takes one existing image.jpg and one payload.ps1 (input by user) andbuilds a new payload (agent.jpg.exe) that if executed it will trigger the download ofthe 2 previous files stored into apache2 (image.jpg + payload.ps1) and execute them.This module also changes the agent.exe Icon to match one file.jpg Then uses the spoof'Hide extensions for known file types' method to hidde the agent.exe extension.All payloads (user input) will be downloaded from our apache2 webserverand executed into target RAM. The only extension (payload input by user)that requires to write payload to disk are .exe binaries.

Exploitation:

FakeImageExploiter stores all files in apache2 webroot, zips (.zip) the agent,starts apache2 and metasploit services(handler), and provides a URL to send totarget (triggers agent.zip download). As soon as the victim runs our executable,our picture will be downloaded and opened in the default picture viewer, ourmalicious payload will be executed, and we will get a meterpreter session.But it also stores the agent (not ziped) into FakeImageExploiter/output folderif we wish to deliver agent.jpg.exe using another diferent attack vector.'This tool also builds a cleaner.rc file to delete payloads left in target'

FakeImageExploiter v1.3

Payloads accepted (user input):

payload.ps1 (default) | payload.bat | payload.txt | payload.exe [Metasploit]"Edit 'settings' file before runing tool to use other extensions"

FakeImageExploiter v1.3

Pictures accepted (user input):

All pictures with .jpg (default) | .jpeg | .png  extensions (all sizes)"Edit 'settings' file before runing tool to use other extensions"

FakeImageExploiter v1.3

Dependencies/Limitations:

xterm, zenity, apache2, mingw32[64], ResourceHacker(wine)'Auto-Installs ResourceHacker.exe under ../.wine/Program Files/.. directorys'WARNING: To change icon manually (resource hacker bypass) edit 'settings' file.WARNING: Only under windows systems the 2º extension will be hidden (so zip it) WARNING: The agent.jpg.exe requires the inputed files to be in apache2 (local lan hack)WARNING: The agent.jpg.exe uses the powershell interpreter (does not work againts wine).WARNING: This tool will not accept payload (user input) arguments (eg nc.exe -lvp 127.0.0.1 555)WARNING: The ResourceHacker provided by this tool requires WINE to be set to windows 7

FakeImageExploiter v1.3

Another senarios:

If you wish to use your own binary (user input - not metasploit payloads) then:

1º - Edit 'settings' file before runing tool and select 'NON_MSF_PAYLOADS=YES'

FakeImageExploiter v1.3
2º - Select the binary extension to use
FakeImageExploiter v1.3
'Remmenber to save settings file before continue' ..

3º - Run FakeImageExploiter to metamorphosis your binary (auto-storage all files in apache) ..

FakeImageExploiter v1.3
4º - Open new terminal and execute your binary handler to recibe connection.
HINT: This funtion will NOT build a cleaner.rc

The noob friendly funtion:

Bypass the need to input your payload.ps1, And let FakeImageExploiter takecare of building the required payload.ps1 + agent.jpg.exe and config the handler."With this funtion active, you only need to input your picture.jpg :D"

FakeImageExploiter v1.3

Select the binary extension to use
FakeImageExploiter v1.3
HINT: This funtion allow users to build (ps1|bat|txt) payloads
HINT: This funtion will NOT build .exe binaries

"WINE is not owned by you":

If you get this message it means that you are executing FakeImageExploiteras sudo and your wine installation belongs to user (is not owned by you) tobypass this issue just execute FakeImageExploiter as the wine owner.EXAMPLE: If wine its owned by spirited_wolf, execute tool without sudoEXAMPLE: If wine its owned by root, execute tool as sudo

Download/Install/Config:

1º - Download framework from github     git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git2º - Set files execution permitions     cd FakeImageExploiter     sudo chmod +x *.sh3º - Config FakeImageExploiter settings     nano settings4º - Run main tool     sudo ./FakeImageExploiter.sh

Framework Banner

FakeImageExploiter v1.3

settings file

FakeImageExploiter v1.3

Agent(s) in windows systems

FakeImageExploiter v1.3

Video tutorials:

FakeImageExploiter [ Official release - Main funtions ]: https://www.youtube.com/watch?v=4dEYIO-xBHU

FakeImageExploiter [ the noob friendly funtion ]: https://www.youtube.com/watch?v=abhIp-SG4kM

FakeImageExploiter [ bat payload - worddoc.docx agent ]: https://www.youtube.com/watch?v=Ah4hejGhj-M

FakeImageExploiter [ txt payload - msfdb rebuild ]: https://www.youtube.com/watch?v=g2E73GyxKhw

Special thanks:

@nullbyte | @Yoel_Macualo | @0xyg3n (SSA team menber)

Credits: https://null-byte.wonderhowto.com/how-to/hide-virus-inside-fake-picture-0168183

Suspicious-Shell-Activity (SSA) RedTeam develop @2017

转载于:https://www.cnblogs.com/clever-universe/p/9079758.html

你可能感兴趣的文章
《HTML5+CSS3网页设计入门必读》——1.3 理解Web内容递送
查看>>
oracle table-lock的5种模式
查看>>
《 线性代数及其应用 (原书第4版)》——2.8 R^n的子空间
查看>>
初创公司如何快速低耗实现数据化运营
查看>>
《循序渐进学Docker》——导读
查看>>
《树莓派开发实战(第2版)》——1.8 使用复合视频显示器/TV
查看>>
编码之道:取个好名字很重要
查看>>
《树莓派开发实战(第2版)》——1.5 通过NOOBS刷写microSD卡
查看>>
《Python Cookbook(第3版)中文版》——1.7 让字典保持有序
查看>>
在 Linux 中设置 sudo 的十条 sudoers 实用配置
查看>>
Linux 有问必答:如何在 Linux 中永久修改 USB 设备权限
查看>>
《第三方JavaScript编程》——7.2 跨站脚本
查看>>
《师兄教你找工作——100场面试 20个offer背后的求职秘密》一导读
查看>>
为PetaPoco添加Fill方法
查看>>
哈哈,找到一种方式来简单模拟EXTJS中与服务器的AJAX交互啦。
查看>>
[WinForm]DataGridView列头右键菜单
查看>>
swing中定时启动的实现
查看>>
Spring IO Platform
查看>>
Hbase协处理器coprocessor
查看>>
json,serialize,msgpack比较
查看>>