Skip to content

This program checks what files and directories are stored in the target's directory, and also sends their name back to the penetration tester.

Notifications You must be signed in to change notification settings

AbdallahAdham/DirStealer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

DirStealer

This program checks what files and directories are stored in the target's directory, and also sends their name back to the penetration tester.

Usage:

First, you need to download a tool to listen for TCP traffic on the machine from inside the victim's machine. The best choice is Netcat.

On Windows:

https://eternallybored.org/misc/netcat/

Unpack the archive (be careful as windows defender might complain that this is a virus, so it's recommended to at least make this file an exception for AV).

Depending on your system architecture, use nc.exe (for 32 bit) or nc64.exe (for 64 bit).

On Linux:

You might want to use the kali linux built-in netcat as well; it's up to you.

Navigate to the directory where netcat resides. Then, run:

nc.exe -lvp 5555 (or the port you specified in the source code) <- For Windows

nc -lvp 5555 (or the port you specified in the source code) <- For Linux

TIP: If your program is not connecting and you are using Windows, check the Firewall settings. It is possible that the firewall is blocking you, so you might want to turn it off for this exercise.

Now, go to the target/victim machine and execute the program. (DirStealer.exe)

Going back to your "attacking" machine, you should see files and directories are stored in the target's directory.

Note: You have to put the DirStealer.exe somehow in the victim's machine secretly 😉

About

This program checks what files and directories are stored in the target's directory, and also sends their name back to the penetration tester.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages