Skip to content

Use a Fake image.jpg (hide known file extensions) to exploit targets

Notifications You must be signed in to change notification settings

C0dak/FakeImageExploiter

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

64 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Version Stage Build

FakeImageExploiter v1.1

FakeImageExploiter v1.2 - backdoor images.jpg[.exe]

CodeName: Metamorphosis
Version release: v1.2 (Beta)
Author: pedro ubuntu [ r00t-3xp10it ]
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2017

Legal Disclamer:

The author does not hold any responsibility for the bad use of this tool,
remember that attacking targets without prior consent is illegal and punished by law.



Description:

This module takes one existing image.jpg and one payload.exe (input by user) and
builds a new payload (agent.jpg.exe) that if executed it will trigger the download
of the 2 previous files stored into apache2 webserver (image.jpg + payload.exe).
This module also changes the agent Icon to match one file.jpg icon. Then uses
'hide known file extensions' to hidde the .exe extension (final: agent.jpg.exe) ..

Exploitation:

FakeImageExploiter stores all files in apache2 webroot, zips (.zip) the agent,
starts apache2 and metasploit services(handler), and provides a URL to send to
target (triggers agent.zip download). As soon as the victim runs our executable,
our picture will be downloaded and opened in the default picture viewer, our
malicious payload will be executed, and we will get a meterpreter session.

But it also stores the agent (not ziped) into FakeImageExploiter/output folder
if we wish to deliver agent.jpg.exe using another diferent attack vector.

'This tool also builds a cleaner.rc file to delete payloads left in target'
HINT: migrate to another process before using cleaner to delete payload.exe

FakeImageExploiter v1.1

Payloads accepted (user input):

payload.exe | payload.ps1 | payload.txt [Metasploit]

Pictures accepted (user input):

All pictures with .jpg (default) | .jpeg | .bmp  extensions (all sizes)
"Edit 'settings' file before runing tool to sellect another extension"



Dependencies:

xterm, zenity, apache2, mingw32[64], ResourceHacker(wine)
'Auto-Installs ResourceHacker.exe under ../.wine/Program Files/.. directorys'

WARNING: The ResourceHacker provided by this tool requires WINE set to windows 7
WARNING: To change icon manually (resource hacker bypass) edit 'settings' file.

Download/Install:

1º - Download framework from github
     git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git

2º - Set files execution permitions
     cd FakeImageExploiter
     sudo chmod +x *.sh

3º - Run main tool
     sudo ./FakeImageExploiter.sh

Special thanks:

@0xyg3n (SSA team menber)


Framework Banner

FakeImageExploiter v1.1

Agent on windows systems

FakeImageExploiter v1.1

Suspicious-Shell-Activity (SSA) RedTeam develop @2017

About

Use a Fake image.jpg (hide known file extensions) to exploit targets

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 95.0%
  • C 5.0%