ISR-evilgrade – Inject Updates to Exploit Software

Outsmart Malicious Hackers


ISR-evilgrade is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates and exploiting the system or software.

How does it work?

It works with modules, each module implements the structure needed to emulate a false update of specific applications/systems. Evilgrade needs the manipulation of the victims DNS traffic, it works in conjunction with man-in-the-middle techniques or MITM such as DNS, ARP, DHCP, etc.

Attack Vectors

Internal scenario:

  • Internal DNS access
  • ARP Spoofing
  • DNS Cache Poisoning
  • DHCP Spoofing

External scenario:

  • Internal DNS Access
  • DNS Cache Poisoning

What are the supported OS?

The framework is multiplatform, it only depends of having the right payload for the target platform to be exploited.

Implemented modules

  • Java plugin
  • Winzip
  • Winamp
  • MacOS
  • OpenOffice
  • iTunes
  • Linkedin Toolbar
  • DAP [Download Accelerator]
  • Notepad++

You can download ISR-evilgrade here:

isr-evilgrade-1.0.0.tar.gz

Or read more here.

Posted in: Exploits/Vulnerabilities, Hacking Tools, Secure Coding

, , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


6 Responses to ISR-evilgrade – Inject Updates to Exploit Software

  1. Morgan Storey August 29, 2008 at 11:24 am #

    Thanks for the mention… Nah I am kidding. It is an awesome little proof of concept, I am wondering why they aren’t including windows updates. I am pretty sure from what I have seen it is only http (not https), so it could be broken as well in the same manner, anyone have a link to prove me wrong?

  2. lyz August 30, 2008 at 12:09 pm #

    Windows update crack prolly just in the making.. lol

  3. Morgan Storey August 31, 2008 at 12:01 am #

    well I decdied to check a bit how windows updates works, cause I was sure it is http.
    I google, no mention of any internal signing process.
    Next step a quick netstat. It is plain http traffic, as I originally thought. Makes me feel all safe and warm… sarcasm doesn’t present well on the internet, but yikes I am glad I have moved away from windows.

  4. d347hm4n September 1, 2008 at 7:42 am #

    Was wondering when a tool was going to come out to use this P.O.C.

  5. Navin September 1, 2008 at 9:55 am #

    +1
    c’mon its like a holy grail for a dark-hatter…the ability to infect millions of people at a go!! Windows Update seriously, as Morgan pointed out, shows how insecure Windows is compared to other OSes

  6. Morgan Storey September 1, 2008 at 10:33 am #

    @Navin: Well yes windows updates is insecure, but have a look at Redhat, its key was compromised, and a few packages signed with it. A lot of Linux package managers (except apt I am pretty sure) have been shown to install an older (vulnerable) version of a package over an existing newer package, so the same dns redirect would work there, as long as the repo’s gpg key was trusted, but how many users would just click continue…