Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 622 Vote(s) - 3.55 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Backdooring .pdf files

#1
Didn't see this shit anywhere on here, so I might as well share.

Materials:
Any .pdf file of your choosing
Metasploit
Fully-Undetectable Server

First, you're going to have to upload your Server to a site with direct linking.

Such as, ge.tt or dropbox.

Step 1: Open up the metasploit console.

Step 2: Type into the console

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Step 3: Type into the console

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Step 4: Type into the console

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Step 5: Type into the console

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Step 6: Type into the console

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


The backdoored .pdf will be saved to the same directory as the original .pdf with the filename of 'evil.pdf'.
Reply

#2
how easy is metasploit to learn? Plus i thought it didnt work with windows 7...?
Reply

#3
Very nice bro. I'ma have to try this sometime. ^_^
Reply

#4
Nice, I will surely use this!

Thank you for sharing Corrupt!
Reply

#5
Quote:(01-19-2013, 12:20 AM)Phytrix Wrote:

[To see links please register here]

Quote: (01-19-2013, 12:18 AM)King Cairo Wrote:

[To see links please register here]

I've heard that this isn't FUD tho... :S
Is that true?

If you have a FUD server it should be.

What if I use a .jar server? I mean a Jrat server. Will it work?
I'm pretty familiar with metasploit but I'm just asking.
Reply

#6
Metasploit is very easy to use, just have to learn how to
Reply

#7
Quote:(01-19-2013, 12:21 AM)King Cairo Wrote:

[To see links please register here]

Quote: (01-19-2013, 12:20 AM)Phytrix Wrote:

[To see links please register here]

Quote: (01-19-2013, 12:18 AM)King Cairo Wrote:

[To see links please register here]

I've heard that this isn't FUD tho... :S
Is that true?

If you have a FUD server it should be.

What if I use a .jar server? I mean a Jrat server. Will it work?
I'm pretty familiar with metasploit but I'm just asking. :biggrin:

If your server is FUD, despite what kind of server, it shouldn't be picked up by any AV/AM.
Reply

#8
I've heard that this isn't FUD tho... :S
Is that true?
Reply

#9
This exploits been patched for a while, and you have to use an exe on the other person's computer, so this wouldn't work.
Reply

#10
Quote:(01-19-2013, 12:18 AM)King Cairo Wrote:

[To see links please register here]

I've heard that this isn't FUD tho... :S
Is that true?

If you have a FUD server it should be.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through