How to Make a Fully Undetected Backdoored Program

Oct 1, 2015 07:02 PM
Oct 1, 2015 07:03 PM
635792957516021687.jpg

You always wanted to make an undetected payload and make it look legit, Well this is what this tutorial is about, You're going to learn how to backdoor any (Unfortunately only 32-Bit) software, Let's get into it

Step 1: Download Shellter

First of all, Head to Shellter download page and download it, then extract the folder, Don't use apt-get shellter since it will download an older version

635792953819459766.jpg

Step 2: Backdooring a Software

After downloading head to the folder where you extracted Shellter, then run the executable "i assume you got wine installed" You will get this screen

635792957516021687.jpg

We will chose Auto mode for now, you can experiment by yourself later, After choosing Auto you will be asked to put the directory of the file we want to backdoor, In my case its

/root/Desktop/puttygen.exe

After that press enter

635792961164115476.jpg

We now wait until we get the second prompt

635792962282584501.jpg

After waiting for a while we get to choose the payload, you can import custom payloads too, we will use the popular windows/meterpreter/reverse tcp

635792963503365341.jpg

Type L then choose the payload number, in my case it's 1, then set the LHOST using your ip and LPORT with the port number you're going to use

635792965175521420.jpg

After doing so the tool will handle the rest, after a while the software will get backdoored:

635792965954740131.jpg

Alright, moving to the next step.

Step 3: Set-Up the Listener

After backdooring the software we will setup the listener, run msfconsole then use the multi/handler

635792968206771778.jpg

and set the payload as "windows/meterpreter/reverse tcp" Then set the "LHOST" and "LPORT" (they should be the same as the ones we used in Shellter) and Finally make sure everything is right using "show options"

After everything is done and set-up correctly we run the listener using "run" or "exploit" command

635792970418992285.jpg

Good, moving to step 4.

Step 4: Send the File to the Victim

After setting up everything, we should send the file to the victim and wait for him to open it

635792972536615906.jpg

Now here comes the tricky part, as soon as he opens the file we should have a Meterpreter session

635792973771802871.jpg

As soon as he closes the file we lose the session, so whenever the victim opens the file and the sessions pops up you should get the processes list using "ps" command and migrate the session to another process

635792976225396649.jpg

Now migrate to one of the processes

635792976529146402.jpg

Now even if he closes the file we're still in.

Step 5: Have Fun

That's it, Have fun backdooring softwares

635792977513648705.jpg

Comments

No Comments Exist

Be the first, drop a comment!