18 October 2010 | 10,016 views

USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

Secure Your Website with Acunetix

PoC to generate Reverse TCP backdoors (x86, x64, all ports), running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The Meterpreter script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

You can download USBsploit here:

usbsploit-0.3-BETA-linux-i686.tar.gz

Or read more here.





                

Recent in Exploits/Vulnerabilities:
- Heartbleed Bug SSL Vulnerability – Everything You Need To Know
- Oracle Java Cloud Service Vulnerabilities Publicly Disclosed
- ODA – Online Web Based Disassembler

Related Posts:
- A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor
- REMnux: A Linux Distribution For Reverse-Engineering Malware
- UK Wants Backdoor in Next Version of Microsoft Windows

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 225,313 views
- AJAX: Is your application secure enough? - 118,948 views
- eEye Launches 0-Day Exploit Tracker - 84,996 views

Advertise on Darknet

One Response to “USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files”

  1. Tyler 19 October 2010 at 10:46 pm Permalink

    Does this run off a thumb drive? I’m not fully clear on what this project does.

    thanks