Skip to content

[Discontinued] Transform your payload into fake powerpoint (.ppt)

License

Notifications You must be signed in to change notification settings

Tsuyoken/MSBackdoor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

023120f · Dec 2, 2020

History

17 Commits
Nov 30, 2019
Dec 2, 2019
Nov 30, 2019
Nov 30, 2019
Dec 3, 2019
Dec 2, 2020
Dec 2, 2019
Dec 2, 2019

Repository files navigation

Microsoft Backdoor

Version Stage Build license

Version release: v1.0
Author: Ferdi S Kennedy (kennedy69)
Distros Supported: Linux Kali, Ubuntu, Mint

Transform your payload.exe into one fake Powerpoint (.ppt)

Simple script that allow users to add a ms-word icon to one
existing executable.exe (using resource-hacker as backend appl)
and a ruby one-liner command that will hidde the .exe extension
and add the word doc .ppt extension to the end of the file name.

Spoof extension methods

backdoorppt tool uses 2 diferent extension spoof methods:
'Right to Left Override' & 'Hide Extensions for Known File Types'
Edit the 'settings' file to chose what method should be used..

cd backdoorppt && nano settings

Dependencies (backend applications required)

xterm, wine, ruby, ResourceHacker(wine)

'backdoorppt script will work on wine 32 or 64 bits'
'it also installs ResourceHacker under .../.wine/Program Files/.. directorys'

Tool Limitations

1º - backdoorppt only supports windows binarys to be transformed (.exe -> .ppt)
2º - backdoorppt requires ResourceHacker installed (wine) to change the icons
3º - backdoorppt present you 6 available diferent icons (.ico) to chose from
4º - backdoorppt does not build real ms-word doc files, but it will transform
     your payload.exe to look like one word doc file (social engineering).



Final notes

Target user thinks they are opening a word document file,
but in fact they are executing one binary payload insted.

Follow My Social Media

Instagram: @ferdikennedy
Facebook: Ferdi S Kennedy
E-mail: ferdikennedy@protonmail.com