Create a Reverse Shell Using a Fake MP4 File [Tutorial]

Поділитися
Вставка
  • Опубліковано 17 лис 2020
  • Earn $$. Learn What You Need to Get Certified (90% Off): nulb.app/cwlshop
    How to Pop a Shell Using a Video
    Full Tutorial: nulb.app/x4k28
    Subscribe to Null Byte: goo.gl/J6wEnH
    Nick's Twitter: / nickgodshall
    Cyber Weapons Lab, Episode 199
    In our latest video, we're showing how hackers can take advantage of flaws in common Linux file system managers to modify a video to run malicious code, phoning back to a hacker's server and running commands. Big shout out to Tokyoneon ( / tokyoneon_ , whose article on Null Byte serves as the basis for this cybersecurity tutorial.
    To learn more, check out Tokyoneon's article on Null Byte: nulb.app/x4k28
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Weekly newsletter: eepurl.com/dE3Ovb
    Vimeo: vimeo.com/channels/nullbyte
  • Навчання та стиль

КОМЕНТАРІ • 280

  • @Hack2WRLD
    @Hack2WRLD 3 роки тому +16

    Really very good tutorial. Got to learn something new about "sudo !!". Keep posting such awesome tutorials.

  • @L4marca
    @L4marca 3 роки тому +32

    This must be from the future, considering that Mint is on v20.

    • @MsHojat
      @MsHojat 3 роки тому +2

      Yeah I was confused by that as well.

  • @elvanmorris3708
    @elvanmorris3708 3 роки тому +6

    Earthlings blink while none earthlings don't blink you know thy self , nice tut bro

  • @RobertGallop
    @RobertGallop 3 роки тому +85

    Be cool to see this with a windows machine as the target as well. If something this simple works anyways...

    • @TheRobMozza
      @TheRobMozza 3 роки тому +14

      Now there's a follow up video idea! Any takers? (If it were applicable, Microsoft will of already patched it)

    • @lesliesavage9229
      @lesliesavage9229 2 роки тому +9

      Actually it doesn't work that easy. If you copy a link, which is what this is, to another computer, it will ask you if you want to trust it before running it. All he is doing here is click baiting you and others to his UA-cam video. It looks like he zipped the "fake" file on his virtual computer, because ALL links made in this fashion will ask you if you trust it for the FIRST run on THAT computer. It will NOT just run as he has shown. You copy it to a new computer, if it copies at all, because it is often refuses, and you have to allow it to be copied, and on the new computer it will ask for permission again, when run for the first time. There is something fishy going on here that he isn't telling you.
      Windoze is easier. Have a batch file run something and load your payload into the directory that runs things when Windoze is booted. I once turned a screen upside down using this method. It took him an hour to fix it.

    • @revelingg
      @revelingg Рік тому

      @@lesliesavage9229 ay bro can you explain more indepth on this?

    • @revelingg
      @revelingg Рік тому

      @@lesliesavage9229 can we talk more u seem knowledgeable and i’m trying to learn

    • @lesliesavage9229
      @lesliesavage9229 Рік тому +1

      @@revelingg I am talking about two different things, so I am not sure what you are asking.
      I just set it up again just for you on two Linux operating systems, and it still doesn't work. How many ways can this be explained that it will not work over the net on Linux Mint? He is dead at the link, and he needs one computer to be open to the net, which he never covers. He needs access to the target computer, which he doesn't have to set up netcat, and know which ports are open. It doesn't even work locally, which is all of his demonstration. He isn't showing something, because even links don't work like in this video. The first time you open a link it asks for permission, and his never does, he is lying by omission or using an outdated version of Linux Mint. No other way to put it.

  • @TheRobMozza
    @TheRobMozza 3 роки тому +6

    That's quite scary, thank God for frequent security updates! Unfortunately there aren't many zero day exploits (hence the name) being published on UA-cam, but that in itself is even more scary!

  • @geertwilders457
    @geertwilders457 3 роки тому +178

    U blinked 3 times under 10seconds. We cant accept you
    Im sorry dont hack me lol

  • @nirmalatiwari3295
    @nirmalatiwari3295 3 роки тому +1

    Great tutorial, thanks

  • @thepianoaddict
    @thepianoaddict 3 роки тому +11

    Wow, you're a real hacker! On 4:44 you enter the wrong ip address but it still worked!

    • @sluvvr
      @sluvvr 3 роки тому

      Its the ip of the linux vm

    • @thepianoaddict
      @thepianoaddict 3 роки тому

      ​@@sluvvr That does not make a lot of sense to me. The netcat listener is running outside of the vm, the code that is shown on 4:44 is running inside the vm. So that would mean that the vm is connecting to itself, which it isn't.
      He also said "change this ip address to .162 as well", but he never set anything else to .162

    • @abhishekrajput9434
      @abhishekrajput9434 3 роки тому

      @@thepianoaddictHe did it right, he set the IP X.X.X.162 for netcat to connect to the target && he got connected coz the VM is running on bridged mode.

    • @thepianoaddict
      @thepianoaddict 3 роки тому +1

      @@abhishekrajput9434 "he set the IP X.X.X.162 for netcat to connect to the target" Yes, so he did it wrong, because the code is run on the target. I makes no sense to let the target connect to itself.
      "he got connected coz the VM is running on bridged mode." That would explain why it still works even though he didn't do it right.

    • @L4marca
      @L4marca 3 роки тому

      ​@@thepianoaddict That's what a reverse shell does? It connects FROM the target TO the host.

  • @kylo8846
    @kylo8846 3 роки тому +12

    Thanks for this - looks interesting. Would there be a way to remove the other .mp4 file entirely? Seems a little obvious that there is something wrong if there's two mp4 files both pointing to the same one.

    • @DHIRAL2908
      @DHIRAL2908 3 роки тому +1

      Maybe putting a . before it's name might work... As it will become hidden like the .ssh folder...

    • @MsHojat
      @MsHojat 3 роки тому +4

      I'm not sure if you watched the video? From what I understand you're asking how to hide a file that doesn't need to be there in the first place. One only needs to send the fake file, not the video file.

    • @kylo8846
      @kylo8846 3 роки тому +5

      @@MsHojat No, because the fake_video file just executes its code and then runs the real_video file. the video isn't embedded into the file

    • @timbrap4693
      @timbrap4693 2 роки тому +2

      @@kylo8846 no it streams the video online, hence the python server

  • @Charlie8913
    @Charlie8913 3 роки тому +4

    The tutorial mentions that Nemo is vulnerable to this attack, but at least the version on Arch Linux is NOT vulnerable (cause i tested it right now). I always have my file manager in list mode where i see the filesize though, so one would need to add a whole bunch of unnecessary data to the .desktop file to increase the filesize.

    • @MsHojat
      @MsHojat 3 роки тому

      Even if you didn't display file size in the FM, chances are whatever method was used to get the file in the first place would show it's size as well- probably even multiple times (once in the e-mail before downloading, then again in the download progress). For that matter the speed of the download would also be an indicator as well.
      However perhaps most importantly, I presume that junk space can be added to the file to make it appear the proper size. So it would not be a reliable method of detection.
      I think that the main flaw (which is quite minor) is that there will be major lag between running the file and the video playing. I think that the video doesn't stream, so it would download in full before playing, no? He did say "stream" once though so maybe I'm mistaken.

  • @amonrah1788
    @amonrah1788 3 роки тому

    Great video. Thank you so much

  • @nixcutus
    @nixcutus 3 роки тому +2

    I need to do this today.

  • @Enigmatt_eu
    @Enigmatt_eu 3 роки тому +8

    Nano is not for noobs... Just use what suits you best. Nice presentation btw. 🤜

  • @h4ckv157
    @h4ckv157 3 роки тому

    NULL BYTE IS BACK AFTER A LONG TIME....!!!!

  • @FunnyPantsTV124
    @FunnyPantsTV124 3 роки тому +2

    does this work for a png file or any other image file type?

  • @juliusrowe9374
    @juliusrowe9374 3 роки тому +1

    Great tutorial Nick!

  • @cybercat1531
    @cybercat1531 3 роки тому +26

    Very select 'attack'. I wouldn't even call it one.
    This is really basic and basically not working anywhere anymore, especially if you know how religiously linux desktop users update.
    It's the equivalent of sending a windows shortcut file with a VB script / cmd exec.
    It doesn't have to even be a video file, you can make it look like a PDF icon, or anything else.
    The PDF is much more convincing and you can pad the .desktop file with garbage to give it some file size to fool more observant users.
    Heck you can even make a little basic demo / game, pad your payload to the end of the launch script and send it over as part of a exclusive beta tester deal!
    Works.

    • @floatingblaze8405
      @floatingblaze8405 3 роки тому +2

      I agree, this heavily falls under social engineering. Hell, you could even send someone a straight sh script, if they believe you're tech support.

    • @NullByteWHT
      @NullByteWHT  3 роки тому +13

      Why don't you make a video about that

    • @REDCULT-is-Live
      @REDCULT-is-Live 2 роки тому

      Totally agreed Cyber Cat, when I was watching this video i felt like this guy was talking out of the context, which doesn't even match with the subject of this video, the explanation is not upto the mark, secondly, when you are explaining anything, explain the important points and don't stretch it more by talking some useless things which are not even closer to the actual subject, idea is good though, 👍

  • @andreasp2089
    @andreasp2089 3 роки тому +2

    remember me old school times style

  • @danielmendes2641
    @danielmendes2641 3 роки тому

    would it be possible to create a keygen from the same type of internet router for default passwords in a way of finding all passwords by mac adress or name? for example i have a router with a default password 10 more people have the same router and i have those passwords as well, can we generate more passwords for those routers ?

  • @EpicGameJunkies
    @EpicGameJunkies 3 роки тому +10

    I think this is what comes out when you try doing everything in one take

  • @amritsahu4521
    @amritsahu4521 2 роки тому

    To play the video file why do we need to host it? As we have sent real video files along with the payload, we can play them. Right?

  • @sreyneatdet6346
    @sreyneatdet6346 Рік тому +1

    Does it work on 20.3 the latest version All exerts here ?

  • @mrmonday2000
    @mrmonday2000 2 роки тому +1

    you know you dont need file extensions in linux, also any good blue teamer will always run file "filename" to see what type of file this is, they will see it is not a mp4 file and rm that so fast

  • @milovaldez2320
    @milovaldez2320 6 місяців тому

    Is there a way to modify a mp4 file for android reverse shells? Staged right does some thing similar but unmodified it won't work for my practice target Android version(Oreo). Any thoughts?

  • @shashank.s1492
    @shashank.s1492 3 роки тому +2

    KEEP GOING

  • @SouravKundujaishreeram
    @SouravKundujaishreeram 3 роки тому

    how u get fake_video.mp4 file in when u unzip the file???...because as we can see when zip those file on that time it's .dekstop file and when u unzip that time its mp4 file...how???????????????? is it magic???

  • @alexcricles
    @alexcricles 3 роки тому +2

    It is not mp4 file, right? But desktop file

  • @hmeador03
    @hmeador03 3 роки тому +2

    He Blinked!

  • @sluvvr
    @sluvvr 3 роки тому

    Thanks!

  • @Ryudmilla
    @Ryudmilla 3 роки тому

    good tutorial

  • @ovalwingnut
    @ovalwingnut 3 роки тому +6

    COMPRESSION
    I usually wince when receiving video files (MP3's etc) in compressed file formats. Seems a humous way of sending files that are generally uncompressable by their nature. Unless the "DO NOT COMPRESS" switch is used during their creation - which is helpful when sending multiple files and or password protection.
    p.s. And as you know, compressing a file that is already highly compressed can actually increase its size.... blaw blaw I'm done 🤗
    GREAT VIDEO as always 👍😎
    Thank you
    💜💙💛💚

  • @realhomy
    @realhomy 3 роки тому +1

    Yessir Another upload.

  • @svensalton2147
    @svensalton2147 3 роки тому

    Was that your router ip how will that work are you attacking an internal pc

  • @graffixcreative
    @graffixcreative Рік тому

    only works on local networks not remotely ?

  • @stupidoconiglio
    @stupidoconiglio Рік тому +1

    can you show me how to do it on a windows?

  • @rxdicalforever7847
    @rxdicalforever7847 3 роки тому

    In Step 5 where you put in your own ip address, if i understand properly, the first time u input your ip the victims pc connects to the linux program to download the files. In the part where you put in your ip the second time, can i put in a different ip and port so that it connects to a different pc after downloading the files from your linux computer?

    • @binaryparrot3352
      @binaryparrot3352 2 роки тому +1

      Of course, the commands are completely seperate. you can in fact even change everything in there as they are just batch commands

  • @patdevine3151
    @patdevine3151 3 роки тому +2

    It's very creative but it has to be on same network?

    • @johannjohannes7214
      @johannjohannes7214 3 роки тому +3

      I mean you could use a domain and the server behind it.

  • @tinachawla7636
    @tinachawla7636 3 роки тому +2

    gr8 keep it up !!! hUge Fan

  • @tera_hz7125
    @tera_hz7125 3 роки тому +1

    Crontabs are OP

  • @kamalthapa249
    @kamalthapa249 2 роки тому

    Where is the code I don't see in the article

  • @HERESPILOT
    @HERESPILOT 3 роки тому

    i had an issue when trying this when i tried to open the video file on another Linux computer i got this following error saying (Additional software is required. parole needs application/x-desktop decoder to play this file. it can be installed automatically.) but when i click install i just get an other error saying that Unable to install missing codes.. do you know what could cause this.
    any help will be very much appreciated :)

    • @lesliesavage9229
      @lesliesavage9229 2 роки тому

      Wait till you get to the netcat part and that doesn't work either because you have the firewall up.

  • @kenichichirahama8987
    @kenichichirahama8987 Рік тому

    Is this method allows me to have a control of an android phone ???

  • @luke7090
    @luke7090 3 роки тому

    Hey. will this spook windows defender?

  • @binaryparrot3352
    @binaryparrot3352 2 роки тому +3

    I'm a bit confused, when did you change the file extension?

    • @pi8tol
      @pi8tol 2 роки тому +1

      yes i am also he save file name .desktop and he got mp4 file 7:05 i think they make fool of us XD :(

    • @_underscore_9271
      @_underscore_9271 2 роки тому

      I'm pretty sure it was automatically done by the file manager using the metadata when it unzipped the file, which is probably why this exploit only works with specific file managers

    • @lesliesavage9229
      @lesliesavage9229 2 роки тому

      Desktop files are links in Linux. The first time you run them, which he didn't show you, it gets rid of the .desktop extension, but it comes back when ran on a new computer.

  • @-_krish_-
    @-_krish_- 3 роки тому

    so whats that laptop doing in jet propulsion ??

  • @adrianmendez8901
    @adrianmendez8901 3 роки тому +1

    HUUUUUUUU NEWWW VIDEO HUUUUUUU

  • @mush_mouf
    @mush_mouf 3 роки тому

    nothing happened on the other end. everything tries to go to microsoft store to open

  • @sciencekingdom2322
    @sciencekingdom2322 3 роки тому

    This guy can stare the sin out of you

  • @nerajjha2875
    @nerajjha2875 3 роки тому +2

    On which os do this reverse shell works

  • @naughtysec
    @naughtysec 3 роки тому +2

    Ths what I wait for

  • @mhhh...9507
    @mhhh...9507 3 роки тому

    can run payload also on windows

  • @mohommedkaifmemon3156
    @mohommedkaifmemon3156 2 роки тому

    Can we do this for android as target

  • @MO-zl6xj
    @MO-zl6xj 8 місяців тому

    Can I do this on android as well?

  • @rom8428
    @rom8428 3 роки тому +20

    Well this is creative.

  • @imduong1004
    @imduong1004 6 місяців тому

    how can I download linux mint 19.2, i cant search it anywhere :((

  • @muci.72
    @muci.72 3 роки тому

    new video 🍻🍾🎆

  • @afnank007
    @afnank007 3 роки тому +1

    Its Great...👍

  • @ghoskali2086
    @ghoskali2086 3 роки тому +4

    can this attack be perfomed on android

    • @jttech44
      @jttech44 3 роки тому +3

      no, because it essentially requires that the target machine is pre-compromised. It's not a hack, it's just a file that does something while also playing a video. A cool thing to mess around with, maybe even useful, but not a hack by any means.

    • @zayanalrashdr3948
      @zayanalrashdr3948 3 роки тому

      I don't think so because you need somesort of storage or more like sapce to accurate that and I don't think Android got that sort of access to memory to execute the code and I don't that kind of access can be found on Android at least on unrooted one

  • @tech_N2999
    @tech_N2999 3 роки тому

    Will it work on Android os?

  • @pep2001bg
    @pep2001bg 3 роки тому +5

    Damn, was gonna say first

  • @raunaquepatra3966
    @raunaquepatra3966 3 роки тому

    but what about the network lag?

  • @radiantomen5753
    @radiantomen5753 3 роки тому

    what os is this?

  • @sayandebakhtar193
    @sayandebakhtar193 3 роки тому

    we accept him because he blinks

  • @PotaytoDestroyer
    @PotaytoDestroyer 3 роки тому +6

    You have to be in the same network as the user ... and it only works with a specific Linux ... pretty cool but a little underwhelming tbh 😅 great video though !!

    • @Meganano
      @Meganano 3 роки тому +1

      surprised so many others didnt notice🤦‍♂️👍

    • @prakharmishra3000
      @prakharmishra3000 3 роки тому

      You can do port forwarding to seem like you're in the same network as the target, that's how backdoors work don't they?

    • @PotaytoDestroyer
      @PotaytoDestroyer 3 роки тому

      @@prakharmishra3000 😂😂 I’ll give you points for effort but it’s not exactly right

    • @prakharmishra3000
      @prakharmishra3000 3 роки тому

      @@PotaytoDestroyer well I don't know much about networking, can you explain why?

    • @PotaytoDestroyer
      @PotaytoDestroyer 3 роки тому

      @@prakharmishra3000 rtfm...

  • @swayzierated6756
    @swayzierated6756 Рік тому

    Doesn't the script that you create have to bind to the original video though if you want it to be convincing?? How would you get the thumb nail to show up without having to make the victims computer unzip a 2 file download??

    • @cosmicdust632
      @cosmicdust632 Рік тому

      try empire, its basically the same thing but has that option to show the thumbnail so its a bit more convincing

  • @divyanshuverma3365
    @divyanshuverma3365 3 роки тому

    I am getting a error when I use nautilus . it goes like this
    ** (org.gnome.Nautilus:5727): WARNING **: 12:53:45.087: Error on getting connection: Failed to load SPARQL backend: Cannot autolaunch D-Bus without X11 $DISPLAY
    Unable to init server: Could not connect: Connection refused
    (org.gnome.Nautilus:5727): Gtk-WARNING **: 12:53:45.088: cannot open display:

  • @chiranjeevinaidu3660
    @chiranjeevinaidu3660 3 роки тому

    Can we do this with a jpeg file

  • @bandeirante8597
    @bandeirante8597 3 роки тому +7

    This guy is less scary

  • @limbo8749
    @limbo8749 2 роки тому

    Hey can someone send me a list of all vulnerable Linux?

  • @rpmathur1278
    @rpmathur1278 2 місяці тому

    Not working on internet using ng rock or cloudflared

  • @rectify2003
    @rectify2003 3 роки тому

    29.2?

  • @denniswambua4471
    @denniswambua4471 3 роки тому

    Can it work for .exe file or any other executable program

    • @MsHojat
      @MsHojat 3 роки тому

      exe files are for Windows. This exploit is only specific distributions of linux.

  • @rift9891
    @rift9891 3 роки тому +1

    What if you are on wan? How to specify the port?

  • @emilioortega9487
    @emilioortega9487 3 роки тому +4

    Someone could understand something I didn’t understand, does this exploit only works in linux computers ? doesn’t Windows have this vulnerability? And does this only work being in the same network ?

    • @MsHojat
      @MsHojat 3 роки тому

      There are some related exploits that are comparable in Windows. However as far as I know they will always have the shortcut indicator on the icon which would require the user to be a bit dumber to run.

    • @michelangelop3923
      @michelangelop3923 3 роки тому

      With a static public ip it can work everywhere (with Linux)

  • @kettzy3404
    @kettzy3404 2 роки тому

    Does this work only on my network if so how can i put it to work outside my network?

  • @ha1fdan
    @ha1fdan 3 роки тому +2

    does it work with windows?

    • @RTPTechTips
      @RTPTechTips 3 роки тому +1

      Not based on example shown. This one is set to linux file mgmt + reverse shell /bin/bash

  • @lumatozerpublishing1519
    @lumatozerpublishing1519 2 роки тому

    Does it work on android???

  • @Pentestersploit
    @Pentestersploit 2 роки тому

    It work

  • @3xRubiks
    @3xRubiks 3 роки тому

    Why do I need a reverse shell

  • @nominsml9583
    @nominsml9583 3 роки тому

    what OS you used in this vedio ?

  • @cryp0g00n4
    @cryp0g00n4 2 роки тому

    Is this how websites with bootlegged streaming videos put those sites up in order to gain access to your machine? He was using Linux here. A hacker would need a specific exploit for each OS to make it ubiquitous so does that mean Hackers just honeypot the videos until a vulnerable machine pops up in the queue. This is probably a data mining problem as Im sure once access is gained the hacker will have a class of subroutines that will search for the juicy bits and provide a summary/report with the most promising leads. What a headache... does a hacker think like this? Im sure there is a different classes of hackers. Some for fun, some casual, the professionals and then the 0.01% geniuses u want to stay away from who could do a lot of damage if they cared to.

  • @romanhossen6392
    @romanhossen6392 2 роки тому

    You just look like spider man homecoming actor Tom Holland 😍

  • @realhomy
    @realhomy 3 роки тому +3

    Nick G what up

  • @baskaran.mbaskaran.m5578
    @baskaran.mbaskaran.m5578 3 роки тому

    in bettercap bluetooth ,after typing command ble.recon on ,its telling ([err]no available device) even my bluetooth also turned on what can i do please help me anyone

  • @scarlet3013
    @scarlet3013 3 роки тому

    who have fixed the apktool issues am stuck there ?

  • @thedarkisder-anethicalcrac3720
    @thedarkisder-anethicalcrac3720 3 роки тому

    Its so interesting :)

  • @Laconism360
    @Laconism360 2 роки тому

    Can i do it for android hack

  • @Kavvyo
    @Kavvyo 3 роки тому

    can I use this for android 😐

  • @peterfromla7505
    @peterfromla7505 2 роки тому

    So how to prevent this kind of attack? I'm a video editor by the way. I receive tons of footage from my clients on a regular basis.

    • @lesliesavage9229
      @lesliesavage9229 Рік тому +1

      It isn't going to work anyway. If somebody sends you a link in this manner, clicking on the link will put a dialog box asking you what to do with it. If they changed the dot address to, for example .MP4, it will try to open in your player that will show an error.
      He also doesn't cover how to do a netcat over the net, which means everything here is local, or on your net work only.
      It's just not workable in the real world.

  • @deathfromthekrypt
    @deathfromthekrypt 3 роки тому +1

    What switches are you using on your keyboard

  • @padie2006
    @padie2006 3 роки тому +3

    Where’s Cody??

  • @kaunghtetsan4925
    @kaunghtetsan4925 3 роки тому

    I have rolling ip-s! How do I put ip idress in mp4 file?

    • @tayfun7552
      @tayfun7552 2 роки тому

      Google DynDNS or use a server

  • @newbieberkarya6442
    @newbieberkarya6442 3 роки тому

    Work in windows to?

  • @MRX-cw4qf
    @MRX-cw4qf 3 роки тому

    Does it work on Android devices?

  • @internetparrot9753
    @internetparrot9753 Рік тому +1

    "nothing to see here" HMMMMM

  • @josesandro6116
    @josesandro6116 3 роки тому

    Amigo põe a legenda em português obrigado!!

  • @Wosa_
    @Wosa_ 7 місяців тому

    Does this work on windows 10 or 11

    • @user-kn2dp2rq9k
      @user-kn2dp2rq9k 5 місяців тому

      he said linux exploit that only works on some linux distros.....

  • @abbasshahzad3163
    @abbasshahzad3163 2 роки тому

    tried it and its showing as a .desktop file when zipped

    • @abbasshahzad3163
      @abbasshahzad3163 2 роки тому

      so i got it but its still listening and cant find it

  • @aroberts269
    @aroberts269 3 роки тому

    RIP DarkComet

  • @AayushSharma-gv7tn
    @AayushSharma-gv7tn 3 роки тому

    not understand much part of it