Aang

How to gain access to a PC with a simple IMAGE ! [ GAIN LIFTIME ACCESS AF ]

Recommended Posts

In this new thread , I'll introduce to you a newly launched hacking tool “Fake Image Exploiter”. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious .bat/.exe file inside it. :smart: :smart:

 

 

This way is undetectable and easy for anyone to perform specially the beginners :fiesta:

after doing this all you have to do is to send the image through E-Mail or Facebook [ WHATEVER] :kappa:

 

 

So , let's start The tutorial

 

 

Before , We start Don't forget to give a like :pogchamp: :pogchamp:  So I can continue Posting Fucken HQ Threads :ezy: :ezy:

 

 

 

LEECHERS WILL BE REPORTED AND BANNED

 

LIKE = GOOD MEMBER :hype:

NO LIKE = LEECHER AND WILL BE BANNED IMMEDIATELY :pepi: :pepi: :pepegun:

 

 

 

 

[hide]Let’s start!

 

Open the terminal inside your Kali Linux and type following command to download it from GitHub.

git clone //github.com/r00t-3xp10it/FakeImageExploiter.git

Once it gets downloaded then opens the folder and selects the file “settings” for configuration before running the program

Now make some changes inside the setting file Here you have to declare the type of payload extension you will use to hide it inside the image. You can set any extension among these four: ps1, bat, txt, exe.  I had set PAYLOAD_EXETNSION=bat similarly set BYPASS_RH=NO  and scroll down for next configuration.

 

In the same way, set these two values also  then save the changes.

AUTO_PAYLOAD_BUILD=YES

 

AGENT_HANLER_PORT=4444

 

After making certain changes in setting file then open the terminal and run the program file:

 

cd FakeImageExploiter

 

./FakeImageExploiter.sh

Click on YES to execute framework.

 

Select payload to build as I had chosen window/meterpreter/reverse_tcp for the attack.

 

After then a pop-up box will open which will allow choosing any jpg image so that it could hide .bat file payload inside that image.

 

Now select the icon for your malicious image.

 

Give a name to your payload which will be displayed to the victim as file name

Now it generates a link

send this link to the victim. Now victim will download the zip file you already named [ EX:GAME]

When victim will click on GAME.jpg , we will get a meterpreter session at the background on Metasploit framework.

You need to have port forwarding and kali linux for this tutorial or you can install these tools on windows [ EASY , Just search on youtube how to do it ][/hide]

Share this post


Link to post
Share on other sites

thnaks for sharing this

Share this post


Link to post
Share on other sites

Amazing share, my friend! You just got another like!

 

Btw, congrats on your new premium account, you deserved it!

Share this post


Link to post
Share on other sites

wtf iis that ?

Share this post


Link to post
Share on other sites

want to see bro thks

Share this post


Link to post
Share on other sites

In this new thread , I'll introduce to you a newly launched hacking tool “Fake Image Exploiter”. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious .bat/.exe file inside it. :smart: :smart:

 

 

This way is undetectable and easy for anyone to perform specially the beginners :fiesta:

after doing this all you have to do is to send the image through E-Mail or Facebook [ WHATEVER] :kappa:

 

 

So , let's start The tutorial

 

 

Before , We start Don't forget to give a like :pogchamp: :pogchamp:  So I can continue Posting Fucken HQ Threads :ezy: :ezy:

 

 

 

LEECHERS WILL BE REPORTED AND BANNED

 

LIKE = GOOD MEMBER :hype:

NO LIKE = LEECHER AND WILL BE BANNED IMMEDIATELY :pepi: :pepi: :pepegun:

 

 

 

 

 

 

hmm thxnks a lot in began :fiesta: :fiesta: :fiesta:

Share this post


Link to post
Share on other sites

In this new thread , I'll introduce to you a newly launched hacking tool “Fake Image Exploiter”. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious .bat/.exe file inside it. :smart: :smart:

 

 

This way is undetectable and easy for anyone to perform specially the beginners :fiesta:

after doing this all you have to do is to send the image through E-Mail or Facebook [ WHATEVER] :kappa:

 

 

So , let's start The tutorial

 

 

Before , We start Don't forget to give a like :pogchamp: :pogchamp:  So I can continue Posting Fucken HQ Threads :ezy: :ezy:

 

 

 

LEECHERS WILL BE REPORTED AND BANNED

 

LIKE = GOOD MEMBER :hype:

NO LIKE = LEECHER AND WILL BE BANNED IMMEDIATELY :pepi: :pepi: :pepegun:

 

 

 

 

 

 

thnaks for sharing this

Share this post


Link to post
Share on other sites

In this new thread , I'll introduce to you a newly launched hacking tool “Fake Image Exploiter”. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious .bat/.exe file inside it. :smart: :smart:

 

 

This way is undetectable and easy for anyone to perform specially the beginners :fiesta:

after doing this all you have to do is to send the image through E-Mail or Facebook [ WHATEVER] :kappa:

 

 

So , let's start The tutorial

 

 

Before , We start Don't forget to give a like :pogchamp: :pogchamp:  So I can continue Posting Fucken HQ Threads :ezy: :ezy:

 

 

 

LEECHERS WILL BE REPORTED AND BANNED

 

LIKE = GOOD MEMBER :hype:

NO LIKE = LEECHER AND WILL BE BANNED IMMEDIATELY :pepi: :pepi: :pepegun:

 

 

 

 

 

 

Well it would be intresting!Anyways thanks for the share XD

Share this post


Link to post
Share on other sites

In this new thread , I'll introduce to you a newly launched hacking tool “Fake Image Exploiter”. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious .bat/.exe file inside it. :smart: :smart:

 

 

This way is undetectable and easy for anyone to perform specially the beginners :fiesta:

after doing this all you have to do is to send the image through E-Mail or Facebook [ WHATEVER] :kappa:

 

 

So , let's start The tutorial

 

 

Before , We start Don't forget to give a like :pogchamp: :pogchamp:  So I can continue Posting Fucken HQ Threads :ezy: :ezy:

 

 

 

LEECHERS WILL BE REPORTED AND BANNED

 

LIKE = GOOD MEMBER :hype:

NO LIKE = LEECHER AND WILL BE BANNED IMMEDIATELY :pepi: th

thanks let me me get my glasses

Share this post


Link to post
Share on other sites

Thanks for the Program, will check it out! ;)

Share this post


Link to post
Share on other sites

i am new to this but am interested to check it out

Share this post


Link to post
Share on other sites

Lets try this thing!!

Share this post


Link to post
Share on other sites

is this working also with converted image like posted ones?

Share this post


Link to post
Share on other sites

Lool Seems Funny Hope its working

Share this post


Link to post
Share on other sites

In this new thread , I'll introduce to you a newly launched hacking tool “Fake Image Exploiter”. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious .bat/.exe file inside it. :smart: :smart:

 

 

This way is undetectable and easy for anyone to perform specially the beginners :fiesta:

after doing this all you have to do is to send the image through E-Mail or Facebook [ WHATEVER] :kappa:

 

 

So , let's start The tutorial

 

 

Before , We start Don't forget to give a like :pogchamp: :pogchamp:  So I can continue Posting Fucken HQ Threads :ezy: :ezy:

 

 

 

LEECHERS WILL BE REPORTED AND BANNED

 

LIKE = GOOD MEMBER :hype:

NO LIKE = LEECHER AND WILL BE BANNED IMMEDIATELY :pepi: :pepi: :pepegun:

 

 

 

 

 

Thanks for sharing!

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.