BetterBackdoor : A Backdoor With A Multitude Of Features

BetterBackdoor is a backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response.

This is useful, but it is also limited. BetterBackdoor overcomes these limitations by including the ability to inject keystrokes, get screenshots, transfer files, and many other tasks.

Features

BetterBackdoor can create and control a backdoor.

This created backdoor can:

  • Run Command Prompt commands
  • Run PowerShell scripts
  • Run DuckyScripts to inject keystrokes
  • Exfiltrate files based on extension
  • Exfiltrate Microsoft Edge and WiFi passwords
  • Send and receive files to and from victim’s computer
  • Start a KeyLogger
  • Get a screenshot of victim’s computer
  • Get text copied to victim’s clipboard
  • Get contents from a victim’s file (cat)

This backdoor uses a client and server socket connection to communicate. The attacker starts a server and the victim connects to this server as a client. Once a connection is established, commands can be sent to the client in order to control the backdoor.

To create the backdoor, BetterBackdoor:

  • Creates ‘run.jar’, the backdoor jar file, and copied it to directory ‘backdoor’.
  • Appends a text file containing the server’s IPv4 address to ‘run.jar’.
  • If desired, copies a Java Runtime Environment to ‘backdoor’ and creates batch file ‘run.bat’ for running the backdoor in the packaged Java Runtime Environment.

To start the backdoor on a victim PC, transfer all files from the directory ‘backdoor’ onto a victim PC.

If a JRE is packaged with the backdoor, execute run.bat, otherwise execute run.jar.

This will start the backdoor on the victim’s PC.

Once running, to control the backdoor you must return to BetterBackdoor and run option 1 at start while connected to the same WiFi network as the victim’s computer.

Demo

Also Read – Automatic API Attack Tool 2019

Requirements

  • A Java JDK distribution >=8 must be installed and added to PATH.
  • You must use the same computer to create and control the backdoor.
    • The computer used to create the backdoor must be on the same WiFi network as the victim’s computer.
    • The IPv4 address of this computer must remain static in the time between creating the backdoor and controlling it.
  • The computer used to control the backdoor must have their firewall deactivated, and if the computer has a Unix OS, must run BetterBackdoor as ‘sudo’.

Compatibility

BetterBackdoor is compatible with Windows, Mac, and Linux, while the backdoor is only compatible with Windows.

Installation

# clone BetterBackdoor
git clone https://github.com/ThatcherDev/BetterBackdoor.git

# change the working directory to BetterBackdoor
cd BetterBackdoor

# build BetterBackdoor with Maven
# for Windows run

mvnw.cmd clean package

# for Linux run
chmod +x mvnw ./mvnw clean package

# for Mac run
sh mvnw clean package

Usage

java -jar betterbackdoor.jar

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago