Description: Learn how to create a standalone Trojan binary using the Metasploit Framework. We use the msfpayload option to output raw data, which we then encode via msfencode. Finally, we pipe it to a new executable file. The HTML follow-along for the video tutorial is located at http://technology-flow.com/tutorials/metasploit-backdoor/
Tags: metasploit backdoor , metasploit , metasploit binary , metasploit trojan , create trojan , create backdoor , standalone trojan , reverse_tcp , metasploit framework , metasploit tutorial , metasploit framework tutorial , reverse_tcp tutorial , msfencode , msfpayload , msfpayload tutorial , metasploit executable , metasploit program ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Very good video bro, just a quick question.
How effective is the payload gonna be, once it has been encoded with Shikata ga nai? Will most AV products be able to detect it? Or will it slip right through undetected.
Thank you.
Hi infiltrator,
I did a research project on this not too long ago actually. I found that encoding scheme such as context_time and context_stat worked the best in avoiding AV software. I believe it's because these schemes actually pull information from the system during the encoding process, rather than other algorithms such as Shikata ga nai, which are more static.
Nice video !
I just have one question, is it possible to reverse connection through vpn? I mean that is it possible for attacker to leave backdoor in my computer, and then the backdoor program will try to connect to the attacker's computer , which is behind a VPN ?
xseni32,
I haven't tried this myself, but it's an interesting idea. I would imagine that it would work, but it would need configuration. You would need some way for the reverse connection to get through to your (attacker) computer. This would probably require some type of forwarding, which would vary between each VPN service. I've only dealt with VPN on a pretty simple level, so this is all I can say. Hope that helped
Ok ! thanks for answering, I'll take a look about forwarding if it's possible :)