• We just launched and are currently in beta. Join us as we build and grow the community.

Embed Payload (Exe) into a PDF Documents – EvilPDF

Vango

Boss Fight Pro
V Rep
0
0
0
Rep
0
V Vouches
0
0
0
Vouches
0
Posts
46
Likes
179
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Lodd-Sons-Plumbing.png


Hey folks, today we are going to talk about the tool that can easily add malicious payloads within the .PDF extension files and after which you can easily access any system. As we know it is prohibited to execute malicious payloads inside the window defender system, hence we will send our payload through the PDF files.

Environment

Kali Linux = Attacker
Window 10 = Victim ( Tested On )

Lets take a look 🙂 !!

EvilPDF

The EvilPDF tool is specifically designed to embed payloads inside PDF files. It is an open source tool hosted on the github page that we will download using the wget command.

git clone https://github.com/thelinuxchoice/evilpdf
cd evilpdf12git clone
https://github.com/thelinuxchoice/evilpdfcd evilpdf

It require some additional features that we can download using the following command.

python -m pip install pypdf21python-mpip install pypdf2

1-15.png


Now we can use this tool using the given command.

python evilpdf.py1python evilpdf.py

2-12.png


In the image below you have to change these options. Also you do not need to change other options.

Lhost = { Your Locahost Address }
Lport = { Any Which You Want 0-65535 }
Exe File Name = { As Your Requirement }

3-14.png


We will use the php code below which will help us in extending our payload to vicitm.
Usage 🙂 php -S < Your Lhost > : < Your Lport >

4-15.png


First victim will download our zip file and then open the PDF file.

5-11.png


As soon as vcitim opens the PDF file, the payload will be automatically downloaded on that system and as you remember we created a payload named “adobe_update” which will be downloaded by the victim as a software update.

6-10.png


As soon as victim executes the payload, you will have full access of that system immediately.

7-9.png


If you want to take the access of that system as meterpreter so you can use the metasploit framework.

About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Connect on Linkedin.
 

437,153

314,794

314,803

Top