Version release: v1.5-Stable
Distros Supported: Linux Kali, Ubuntu, Mint
Author: pedro ubuntu [ r00t-3xp10it ]
Suspicious-Shell-Activity© (SSA) RedTeam develop @2017
Transform your payload.exe into one fake word doc (.ppt)
Simple script that allow users to add a ms-word icon to one
existing executable.exe (using resource-hacker as backend appl)
and a ruby one-liner command that will hidde the .exe extension
and add the word doc .ppt extension to the end of the file name.
Spoof extension methods
backdoorppt tool uses 2 diferent extension spoof methods:
'Right to Left Override' & 'Hide Extensions for Known File Types'
Edit the 'settings' file to chose what method should be used..
cd backdoorppt && nano settings
Dependencies (backend applications required)
xterm, wine, ruby, ResourceHacker(wine)
'backdoorppt script will work on wine 32 or 64 bits'
'it also installs ResourceHacker under .../.wine/Program Files/.. directorys'
1º - backdoorppt only supports windows binarys to be transformed (.exe -> .ppt)
2º - backdoorppt requires ResourceHacker installed (wine) to change the icons
3º - backdoorppt present you 6 available diferent icons (.ico) to chose from
4º - backdoorppt does not build real ms-word doc files, but it will transform
your payload.exe to look like one word doc file (social engineering).
Backdoorppt 1º run (Kali distros)
Backdoorppt working (Kali distros)
transformed files on-target system (windows)
Target user thinks they are opening a word document file,
but in fact they are executing one binary payload insted.
Credits: Damon Mohammadbagher