Skip to content

Latest commit

 

History

History
31 lines (17 loc) · 1.38 KB

README.md

File metadata and controls

31 lines (17 loc) · 1.38 KB

DirStealer

This program checks what files and directories are stored in the target's directory, and also sends their name back to the penetration tester.

Usage:

First, you need to download a tool to listen for TCP traffic on the machine from inside the victim's machine. The best choice is Netcat.

On Windows:

https://eternallybored.org/misc/netcat/

Unpack the archive (be careful as windows defender might complain that this is a virus, so it's recommended to at least make this file an exception for AV).

Depending on your system architecture, use nc.exe (for 32 bit) or nc64.exe (for 64 bit).

On Linux:

You might want to use the kali linux built-in netcat as well; it's up to you.

Navigate to the directory where netcat resides. Then, run:

nc.exe -lvp 5555 (or the port you specified in the source code) <- For Windows

nc -lvp 5555 (or the port you specified in the source code) <- For Linux

TIP: If your program is not connecting and you are using Windows, check the Firewall settings. It is possible that the firewall is blocking you, so you might want to turn it off for this exercise.

Now, go to the target/victim machine and execute the program. (DirStealer.exe)

Going back to your "attacking" machine, you should see files and directories are stored in the target's directory.

Note: You have to put the DirStealer.exe somehow in the victim's machine secretly 😉