• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

GhostTunnel

Status
Not open for further replies.

0x1

LeVeL23 HacKerS TeaM
User
Joined
Nov 15, 2013
Messages
880
Reputation
0
Reaction score
6,315
Points
243
Credits
78
‎11 Years of Service‎
18%
GhostTunnel


Spoiler


GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload (agent), then the HID device can be removed after the payload is released.

GhostTunnel use 802.11 Probe Request Frames and Beacon Frames to communicate and doesn't need to establish a wifi connection. Exactly, it communicates by embedding data in beacon and probe requests. We publish the GhostTunnel server and windows agent implemented in c/c++. The agent doesn't need elevated privileges, it uses the system wifi api to send the probe request and receive the beacon. such as on windows, uses the Native WiFi API. So you can implement the corresponding agent on other platforms. The server runs on linux, you need one or two usb wifi card that supports monitor mode and packet injection to run it.

Advantages

  • Covertness.
  • No interference with the target’s existing connection status and communications.
  • Can bypass firewalls.
  • Can be used to attack strictly isolated networks.
  • Communication channel does not depend on the target’s existing network connection.
  • Allow up to 256 clients
  • Effective range up to 50 meters
  • Cross-Platform Support.
  • Can be used to attack any device with wireless communication module, we tested this attack on Window 7 up to Windows 10, and OSX.

Server

Only need one or two wireless network cards that supports packet injection and monitor mode, like TP-LINK TL-WN722N, Alfa AWUS036ACH.

Usage

Code:
	./ghosttunnel [interface]
	./ghosttunnel [interface1] [interface2]

	COMMANDS:
		sessions = list all clients
		use = select a client to operate, use [clientID]
		exit = exit current operation
		wget = download a file from a client, wget [filepath]
		quit = quit ghost tunnel
		help = show this usage help
Function Implementation

  • Shell command Create a remote shell.
  • Download file The file maximum size limit is 10M and can only download one file at a time.
  • You can add other functions as needed.

Source & Download

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top