In this article we are introducing a newly launched hacking tool “Fake Image Exploiter”. It is design so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with hidden malicious .bat/.exe file inside it.
Let’s start!
Open the terminal inside your kali Linux and type following command to download it from github.
Git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git
![](https://i2.wp.com/4.bp.blogspot.com/-axoKP0L6ci0/WQSeppU2CHI/AAAAAAAAP4M/gmp166eSrp0SBYEMFeOS0sRX4wxDDi3LwCLcB/s1600/1.png?zoom=2&w=584&ssl=1)
Once it gets downloaded then opens the folder and selects the file “settings” for configuration before running the program as shown the given screenshot.
![](https://i0.wp.com/1.bp.blogspot.com/-XRvjC3nhM68/WQSeqZ2CG7I/AAAAAAAAP4Y/pWNeekby0mEWKvOjvyfeEMFuO-0res_HgCLcB/s1600/2.png?zoom=2&w=584&ssl=1)
Now made some changes inside setting file as shown the screenshot:
Here you have to declare the type of payload extension you will use to hide it inside the image. You can set any exetension among these four : ps1, bat, txt, exe. I had set PAYLOAD_EXETNSION=bat similarly set BYPASS_RH=NO and scroll down for next configration.
![](https://i1.wp.com/4.bp.blogspot.com/-Hlb2YW3OlVU/WQSeqtjU13I/AAAAAAAAP4c/eufzayNfCDsO0KNACZb6P2W12-bq1nA4wCLcB/s1600/3.png?zoom=2&w=584&ssl=1)
In same way set these two values also as shown in screenshot then save the changes.
AUTO_PAYLOAD_BUILD=YES
AGENT_HANLER_PORT=4444
![](https://i1.wp.com/1.bp.blogspot.com/-wroLUUK47fM/WQSeq_5e8UI/AAAAAAAAP4g/4txENjK_PNsqceE3O5klolaDQwI-lKCSgCLcB/s1600/4.png?w=584&ssl=1)
After making certain changes in setting file then open the terminal and run the program file:
Cd FakeImageExploiter
./ FakeImageExploiter.sh
![](https://i2.wp.com/3.bp.blogspot.com/-bhVq-12EGqc/WQSerGoYz5I/AAAAAAAAP4k/uDLXDgENZmU2xx2mzPpJsxTt8uExB_BQACLcB/s1600/5.png?zoom=2&w=584&ssl=1)
Click on YES to execute framework.
![](https://i1.wp.com/3.bp.blogspot.com/-uvbuQx3jqug/WQSerEkH-iI/AAAAAAAAP4o/Z6onVeNOgv4RGgdEdntWUvmMoD4ZRGxcACLcB/s1600/6.png?zoom=2&w=584&ssl=1)
Select payload to build as I had choose window/meterpreter/reverse_tcp for attack.
![](https://i1.wp.com/2.bp.blogspot.com/-tMHzUvrQyX0/WQSersbGlOI/AAAAAAAAP4s/fQhpmpPIbfAKg6I7_7S0KF4pdrksDofcQCLcB/s1600/7.png?zoom=2&w=584&ssl=1)
After then a pop up box will open which will allow choosing any jpg image so that it could hide .bat file payload inside that image.
![](https://i1.wp.com/4.bp.blogspot.com/-sEMuGuI2tCQ/WQSer-qUGlI/AAAAAAAAP40/GjmZjHzxgM8XlZW8y7_vSUED5orOZCT-QCLcB/s1600/8.png?zoom=2&w=584&ssl=1)
Now select icon for your malicious image.
![](https://i0.wp.com/2.bp.blogspot.com/-xoP6Kn-X-tY/WQSer34H1wI/AAAAAAAAP4w/NCh75ZqEUVMCuM52KrqKKkjt1d_C0fdZwCLcB/s1600/9.png?zoom=2&w=584&ssl=1)
Give a name to your payload which will be display to victim as file name, from screenshot you can see I had given sales.
![](https://i1.wp.com/2.bp.blogspot.com/-P01-jk9IJSM/WQSepqM250I/AAAAAAAAP4I/vdZQHuI26h04iuGpZbyYHTbqaT0uUYX4ACLcB/s1600/10.png?zoom=2&w=584&ssl=1)
Now it generates a link as you can observe it from highlighted part of screenshot and then send this link to victim. Now victim will download the zip file and click on the sales.jpg.
![](https://i2.wp.com/4.bp.blogspot.com/-W1dboECGZBA/WQSepzXOAEI/AAAAAAAAP4Q/L63gaTcAmCUwKDsSBUoXUUv3gpsZkovIwCLcB/s1600/11.png?zoom=2&w=584&ssl=1)
When victim will click on sales.jpg, we will get meterpreter session at the background on metasploit framework.
![](https://i1.wp.com/4.bp.blogspot.com/-UbNo7qfH59g/WQSeqaAyIKI/AAAAAAAAP4U/qQ2sgLTPcPcH7QPI7AOfxd_vxGNxgQx2gCLcB/s1600/12.png?zoom=2&w=584&ssl=1)
Comments
Post a Comment