Author Topic: Injecting payload into softwares via HTTP  (Read 3673 times)

0 Members and 1 Guest are viewing this topic.

Offline geekmango

  • NULL
  • Posts: 1
  • Cookies: -6
    • View Profile
Injecting payload into softwares via HTTP
« on: June 17, 2015, 10:51:19 pm »
Demo Link:https://youtu.be/FMahvXMYuT4
 
Hi, this is a quick demo about how to backdoor executables (software) sent over
HTTP using MITMF, backdoor factory
This attack works on LAN

REQUIREMENTS:

Kali Linux or any Linux OS
Wireless USB Adapter e.g. (TL-WN722N)
MITMf (man-in-the-middle framework) https://github.com/byt3bl33d3r/MITMf
MSFconsole or Armitage
LAN network, same as the target/victim

ATTACK SCENARIO:

Machine A-victim
Machine B-attacker
A situation where machine A wants to download a software for example winrar, the victim goes through google and lands on the page (http://www.win-rar.com/download.html?&L=0) the attacker is already waiting to inject payload into binaries served over (HTTP)
This attack is possible because a lot of tool websites still serve binaries via non-SSL/TLS means

Staff Edit: Why ruin your content with that large bbcode and poor formatting?
« Last Edit: October 16, 2015, 12:46:39 am by iTpHo3NiX »

Offline 0E 800

  • Not a VIP
  • VIP
  • Baron
  • *
  • Posts: 895
  • Cookies: 131
  • • тнε ιηтεяηεт ιs мү яεcүcℓε-вιη •
    • View Profile
Re: Injecting payload into softwares via HTTP
« Reply #1 on: August 14, 2015, 01:35:14 am »
The background music made me lose interest really fast.

How about a step by step documented tutorial w/ screenshots?

Be well.
The invariable mark of wisdom is to see the miraculous in the common.