Skip to Content
Learn Ethical Hacking from Scratch
book

Learn Ethical Hacking from Scratch

by Zaid Sabih
July 2018
Beginner
564 pages
12h 22m
English
Packt Publishing
Content preview from Learn Ethical Hacking from Scratch

Client-side attacks using the bdm2 BDFProxy

In this section, we're going to look at another backdoor delivery method: running our backdoor via an active download. In other words, a user will download and install a program that will run as expected, but with our payload, or backdoor, running in the background. This is possible using a tool called Backdoor Factory Proxy. This also requires a man-in-the-middle access method, such as ARP poisoning.

For this example, we'll go with ARP poisoning so that all traffic will be redirected through our own computer. First, we need to modify the configuration of the bdfproxy.cfg file with the following command:

leafpad /etc/bdfproxy/bdfproxy.cfg

We will now do two things. First, set the proxyMode parameter ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Ethical Hacking From Scratch

Learn Ethical Hacking From Scratch

Zaid Sabih
Ethical Hacking Masterclass

Ethical Hacking Masterclass

SUNIL GUPTA (India), Sunil Gupta
Ethical Hacking

Ethical Hacking

Ric Messier
Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781788622059Supplemental Content