All right, Now we're gonna take a look at backdoor ing and Avery. Gays are rebuilt.
Android application on. We're going to turn it into an SPF agent.
We're in a back door.
That's just download something. We need a pick a tool.
location of the absence of the ABC News. Don't be here.
It's gonna rip it apart.
Give it some information about our
athlete when I control it with it,
Kiki Ones again, always to care you for these examples
Gonna build that into
our back door, J. P. K. And put it back together.
You can use the android master key Vulnerability with will allow us to replace
though on my test thrown, I have the rial ABC News that we just back the word
the master key vulnerability, if the device is vulnerable, actually allowed me to replace that using the
keys that are on the original long.
So after there was a replacement and update from the real author, when in fact we should have no business doing that since we don't have access to their private keys at ABC News
this was a flow and android. It has been fixed but
Mayor, and not have been fixed on the devices you run into run into older android devices that were not getting updates all the time.
No different than we saw
on our Windows Lennox Systems.
I didn't not sure they have all of the updates they needed
course alters. Go do something else and then it'll finish. Did it does
again? This is the legitimate version
that was already on there, and we're going to replace it with a back door broken that looks and feels that they use their exactly the same. But it has some additional functionality.
Now. We can do number one until it to attach to a deployed agent
who will let these guys basically you a handshake with each other in the same way
our application did. This is a
phone that's controlled their target. We've managed somewhere another to get them to download this.
Well, I guess we should send it to them for a strike.
There was actually send it to them.
Example. We can send it to them. The text message.
Let's just uploaded to a Web server and send them a text message telling them, Download it. Maybe not the most sophisticated attack everywhere, but
that phone. So 5554 is going to send a text message to 5556
telling them we just gave it the default text.
This is a cool happen. It'd give you the option to change that.
they are vulnerable to the master key. Vulnerability will actually allow us to replace
ABC News up. That's already there.
If not, if they're not vulnerable, or you just don't want to use master feed,
give you the option of signing it with your own keys If you have a legitimate you. Blake. He even signed it with that.
Actually, even upload your
backdoor adapts to the place where I'm sure they wouldn't appreciate it very much. But there's nothing to stop you from doing that
is going to replace another absent freezing master key.
I'm going. It's following us following.
I don't know why emulators or so. So
you're 16 games to memory, Alan. You think they could use some of that?
All right, then when you click open the look and feel just like the original one.
Well, you have the same neighbors.
Then we can do our what I mentioned before. Attach
with an attached your report agent
and let them do our three way Hendrik basically with each other. So SPF will be able to communicate with this agent.
We can communicate our http or SMS that will check in periodically over http or were considered a message from that 55 by five.
And it will send that text message and we'll hide it in the background and
do whatever it says to do. It has the right key and come from the right number. So this does actually take a whole minute to finish.
This is going to give us access to that device. So there are clients sign attacks
on you could even use medicine Village. There are a few medicine plate modules for phones. A couple of clients, sides for android.
Simple things for our tunis. Well, certainly not as many as we have for some of our other platforms. But anything that isn't medicine boy for removal, you can use it directly through SPF.
It has a couple of clients sides all its own going to the client's eyes and social engineering has
some custom ones there.
primarily, I think, the best way to get on the devices like this through an application that's militias.
Well, we were able to get access to it.