USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

Outsmart Malicious Hackers


PoC to generate Reverse TCP backdoors (x86, x64, all ports), running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The Meterpreter script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

You can download USBsploit here:

usbsploit-0.3-BETA-linux-i686.tar.gz

Or read more here.


Posted in: Exploits/Vulnerabilities, Hardware Hacking, Windows Hacking

, , , , , ,

Recent in Exploits/Vulnerabilities:
- 160,000 Network Printers Hacked
- OWASP VBScan – vBulletin Vulnerability Scanner
- p0wnedShell – PowerShell Runspace Post Exploitation Toolkit

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 237,196 views
- AJAX: Is your application secure enough? - 120,488 views
- eEye Launches 0-Day Exploit Tracker - 86,008 views


One Response to USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

  1. Tyler October 19, 2010 at 10:46 pm #

    Does this run off a thumb drive? I’m not fully clear on what this project does.

    thanks