Crypter.py (undetectable backdoor crypter for metasploit payloads)

Discussion in 'Scripts & Commands' started by ImJoJo, 8 Mar 2013.

  1. ImJoJo

    ImJoJo The One & Only
    VIP

    Joined:
    25 Jun 2012
    Messages:
    257
    Likes Received:
    122
    I figured I would share this...Believe it or not it actually works! I tested on my own machine.


    Description: A new undetectable backdoor crypter for metasploit payloads!

    Script: http://www.mediafire.com/?55q2zisjxif3ez4

    You are going to have to place it in the metasploit directory!
    On Backtrack 5 R3, the directory is: /opt/metasploit/msf3/
    Then, we have to make it executable with the following command:
    Code:
    Select All
    chmod +x crypter.py
    Make sure you have mingw libraries installed:
    Code:
    Select All
    apt-get install mingw32-runtime mingw-w64 mingw gcc-mingw32 mingw32-binutils
    Now go ahead and execute it! Fill in the options to craft your backdoor!

    The script will automatically launch the listener for you, in my case, since I selected the windows shell payload it launched netcat.

    From there we wait untill the victim(s) executes the backdoor to spawn a shell in our listener...

    Original Source: http://www.youtube.com/watch?v=u964EIe-sFc

    UPDATE: This script is no longer good. Its outdated.
     
    • Like Like x 3
  2. Pascal

    Pascal Wifi Sniffer
    Staff Member Moderator VIP

    Joined:
    6 Jun 2012
    Messages:
    211
    Likes Received:
    89
    Congratulations, for this ;)
     
  3. rexy

    rexy Well-Known Member

    Joined:
    5 Mar 2013
    Messages:
    14
    Likes Received:
    10
  4. ImJoJo

    ImJoJo The One & Only
    VIP

    Joined:
    25 Jun 2012
    Messages:
    257
    Likes Received:
    122
    Cool..will try right now..:D

    Sent from my LG-MS770 using Tapatalk 2
     
  5. rexy

    rexy Well-Known Member

    Joined:
    5 Mar 2013
    Messages:
    14
    Likes Received:
    10
    Recommended Seed Number = 7000 and Number of Encode = 14
    and you can change to any payload in Script, it's setup on {windows/meterpreter/reverse_tcp}
     
  6. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    80
    is there a way to work it with kali ?
     
  7. rexy

    rexy Well-Known Member

    Joined:
    5 Mar 2013
    Messages:
    14
    Likes Received:
    10
    1. Just copy it and save it as something.py
    2. open terminal and run chmod +x something,py
    3. ./something.py
    4. You're ready to go
     
  8. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    80
    i tryed the apt get and got nothing ideas ?
     
  9. ImJoJo

    ImJoJo The One & Only
    VIP

    Joined:
    25 Jun 2012
    Messages:
    257
    Likes Received:
    122
    I did a bit of research on it and cant find anything..i tried it on kali as well but no luck. If i cant find any updated fix iI will be removing it.

    NOTE: it is no longer FUD..antivirus software will detect it.

    Sent from my LG-MS770 using Tapatalk 2
     

Share This Page

Loading...