[Image: 4703e5a3cd.png]So Hello everyone,
I'm Spirited wolf as you all know and i'm uploading something after a long because i was busy with my fucking life. [Image: 1f642.png]-
[Image: 47074ce279.png]

-----------------------------
Today we are gonna discuss about one more awesome framework from SSA team i.e FakeImageExploiter.
CodeNameMetamorphosis
Version release: v1.3 (Stable)
Authorpedro ubuntu [ r00t-3xp10it ]
Distros Supported : Linux Ubuntu, Kali,  Mint,  Parrot OS
Suspicious-Shell-Activity© (SSARedTeam develop @2017
 
[Image: O8MjQFl.png]
The author does not hold any responsibility for the bad use of this tool,
remember that attacking targets without prior consent it's illegal and punished by law.
[Image: UQuGs1D.png]
This module takes one existing image.jpg and one payload.ps1 (input by user) and
builds a new payload (agent.jpg.exe) that if executed it will trigger the download of
the 2 previous files stored into apache2 (image.jpg + payload.ps1) and execute them.
This module also changes the agent.exe Icon to match one file.jpg Then uses the spoof
'Hide extensions for known file types' method to hidde the agent.exe extension.
All payloads (user input) will be downloaded from our apache2 webserver
and executed into target RAM. The only extension (payload input by user)
that requires to write payload to disk are .exe binaries.
Today we will check "The Noob Friendly Function".


If you liked this tutorial then please subscribe,Like,Comment and share to my channel. Also you can join me on cracking forums! I'll leave link in description.
----------------------------------------------------------------------------------------------------------
This tutorial is for education purpose only. I'll not be responsible for any harm.
------------------------------------------------------------------------------------------------------------
Please Subscribe My Channel If you like it::
Please Like My Facebook Page::
Follow me on Twitter::
@spirit3113
Thanks!
Continue Reading