18 October 2010 | 10,124 views

USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

Don't let a Dragon into your website!

PoC to generate Reverse TCP backdoors (x86, x64, all ports), running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The Meterpreter script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

You can download USBsploit here:

usbsploit-0.3-BETA-linux-i686.tar.gz

Or read more here.

Advertisements



Recent in Exploits/Vulnerabilities:
- Pinterest Bug Bounty Program Starts Paying
- Rowhammer – DDR3 Exploit – What You Need To Know
- Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD

Related Posts:
- A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor
- REMnux: A Linux Distribution For Reverse-Engineering Malware
- UK Wants Backdoor in Next Version of Microsoft Windows

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 229,835 views
- AJAX: Is your application secure enough? - 119,439 views
- eEye Launches 0-Day Exploit Tracker - 85,213 views

Advertise on Darknet

One Response to “USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files”

  1. Tyler 19 October 2010 at 10:46 pm Permalink

    Does this run off a thumb drive? I’m not fully clear on what this project does.

    thanks