1 / 6

BYPASS ANTIVIRUS WITH FULLY UNDETECTABLE(FUD) PAYLOAD – STEP BY STEP

When a hacker sends any malicious file to the victim, most of the tool doesnu2019t bypass the antivirus (AV) protection. But today we will talk about a tool that can bypass the antivirus protection and compromise the victimu2019s machine. Ethical hacking researcher are always finding easy ways to bypass Antivirus protection, however there are many more way to bypass antivirus protection.

Télécharger la présentation

BYPASS ANTIVIRUS WITH FULLY UNDETECTABLE(FUD) PAYLOAD – STEP BY STEP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BYPASS ANTIVIRUS WITH FULLY UNDETECTABLE(FUD) PAYLOAD – STEP BY STEP INTRODUCTION When a hacker sends any malicious file to the victim, most of the tool doesn’t bypass the antivirus (AV) protection. But today we will talk about a tool that can bypass the antivirus protection and compromise the victim’s machine.Ethical hacking researcher are always finding easy ways to bypass Antivirus protection, however there are many more way to bypass antivirus protection. Now coming to a tool called CatchYou, it’s a social engineering tool which can be used to compromise any windows machine by sending one link to the victim. In this tool, we are using Metasploit Framework to exploit the victim’s machine and Ngrok server as reverse proxy to access private machines on network. This CatchYou tool is easy to install and we will demonstrate the working of this tool in step by step manner. ENVIRONMENT   OS: Kali Linux 2019.3 64 bit Kernel-version: 5.2.0 INSTALLATION STEPS   Use this command to clone the project. git clone https://github.com/thelinuxchoice/catchyou root@kali:/home/iicybersecurity# git clone https://github.com/thelinuxchoice/catchyou Cloning into 'catchyou'... remote: Enumerating objects: 26, done. remote: Counting objects: 100% (26/26), done. remote: Compressing objects: 100% (25/25), done. remote: Total 26 (delta 10), reused 0 (delta 0), pack-reused 0 Unpacking objects: 100% (26/26), 21.74 KiB | 53.00 KiB/s, done.  Use the cd command to enter into catchyou directory. root@kali:/home/iicybersecurity# cd catchyou/ root@kali:/home/iicybersecurity/catchyou#  Now, use this command to launch this tool.

  2. CatchYou  Here, choose the payload option to exploit the victim’s machine.

  3. Windows Payload  Here, it will generate two files catchyou.exe and index.php

  4. Metasploit on hacker machine  Now we selected windows shell reverse_tcp and enter the LHOST and LPORT.  Here we can see that the payload is saved as catchyou.exe and it started the Metasploit Listener by selecting option Y  catchyou.exe file will be saved in catchyou directory.  Now send this exe file to the victim by usingPendrive or by sending URL using social engineering.

  5.  For sending URL using social engineering, we can also Pwndrop tool. pwndrop tool can be used to host your own server and send any file very securely to another person, can be malicious file also. Click here to follow pwndrop setup. Here, we used pwndrop tool to send the URL to victim. Once the Victim click on the URL, it downloads the FUD payload. As shown below.   Malicious link downloading Catchyou.exe on Victim  If the victim opens this exe file on his machine, we will get the shell of victims machine. Victim’s Shell

  6. CONCLUSION We saw on how easy is to compromise the victim’s computer by sending the URL or malicious file to the victim. DO NOT UPLOAD THE PAYLOAD GENERATED ON VIRUSTOTAL. Contact https://www.securitynewspaper.com/ MEXICO 538, Homero #303, Chapultepec Morales, Mexico D.F (Distrito Federal) 11570 INDIA Fifth Floor, HB Twin Tower Netaji Subhash Place, Delhi NCR, 110034

More Related