Categories: Kali Linux

GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload agent, then the HID device can be removed after the payload is released.

GhostTunnel use 802.11 Probe Request Frames and Beacon Frames to communicate and doesn’t need to establish a wifi connection. Exactly, it communicates by embedding data in beacon and probe requests. We publish the GhostTunnel server and windows agent implemented in c/c++.

The agent doesn’t need elevated privileges, it uses the system wifi api to send the probe request and receive the beacon. such as on windows, uses the Native WiFi API. So you can implement the corresponding agent on other platforms. The server runs on linux, you need one or two usb wifi card that supports monitor mode and packet injection to run it.

Also Read Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

Advantages Of GhostTunnel

  1. Covertness.
  2. No interference with the target’s existing connection status and communications.
  3. Can bypass firewalls.
  4. Can be used to attack strictly isolated networks.
  5. Communication channel does not depend on the target’s existing network connection.
  6. Allow up to 256 clients
  7. Effective range up to 50 meters
  8. Cross-Platform Support.
  9. Can be used to attack any device with wireless communication module, we tested this attack on Window 7 up to Windows 10, and OSX.

How To Use ?

  • Server Only need one or two wireless network cards that supports packet injection and monitor mode, like TP-LINK TL-WN722N, Alfa AWUS036ACH. Usage:
 ./ghosttunnel [interface]
 ./ghosttunnel [interface1] [interface2]

 COMMANDS:
  sessions = list all clients
  use = select a client to operate, use [clientID]
  exit = exit current operation
  wget = download a file from a client, wget [filepath]
  quit = quit ghost tunnel
  help = show this usage help
  • Client Release the payload to the target system (only windows client published) and execute it.

Implementation

  • Shell command Create a remote shell.
  • Download file The file maximum size limit is 10M and can only download one file at a time.
  • You can add other functions as needed.

Building

Server Requirements

apt-get install pkg-config libnl-3-dev libnl-genl-3-dev 

Compiling

server:
 cd src
 make
windows client:
 Microsoft Visual Studio 2015 

Credit : Aircrack-ng, MDK4, hostapd & Kismet

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

3 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

3 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago