Gdog – Python Windows Backdoor With Gmail Command & Control

Gdog is a stealthy Python Windows backdoor that uses Gmail as a command and control server, it’s inspired by Gcat and pushes a little beyond a proof of concept with way more features.





Features

  • Encrypted transportation messages (AES) + SHA256 hashing
  • Generate computer unique id using system information/characteristics (SHA256 hash)
  • Job IDs are random SHA256 hashes
  • Retrieve system information
  • Retrieve Geolocation information (City, Country, lat, long, etc..)
  • Retrieve running processes/system services/system users/devices (hardware)
  • Retrieve list of clients
  • Execute system command
  • Download files from client
  • Upload files to client
  • Execute shellcode
  • Take screenshot
  • Lock client’s screen
  • Keylogger
  • Lock remote computer’s screen
  • Shutdown/Restart remote computer
  • Log off current user
  • Download file from the WEB
  • Visit website
  • Show message box to user
Usage
  •      __
    1.            ____ _____/ /___  ____ _
    2.           / __ `/ __  / __ \/ __ `/
    3.          / /_/ / /_/ / /_/ / /_/ /
    4.          \__, /\__,_/\____/\__, /
    5.         /____/            /____/

    6. optional arguments:
    7.   -h, --help            show this help message and exit
    8.   -v, --version         show program's version number and exit
    9.   -id ID                Client to target
    10.   -jobid JOBID          Job id to retrieve

    11.   -list                 List available clients
    12.   -info                 Retrieve info on specified client

    13. Commands:
    14.   Commands to execute on an implant

    15.   -cmd CMD              Execute a system command
    16.   -visitwebsite URL     Visit website
    17.   -message TEXT TITLE   Show message to user
    18.   -tasks                Retrieve running processes
    19.   -services             Retrieve system services
    20.   -users                Retrieve system users
    21.   -devices              Retrieve devices(Hardware)
    22.   -download PATH        Download a file from a clients system
    23.   -download-fromurl URL
    24.                         Download a file from the web
    25.   -upload SRC DST       Upload a file to the clients system
    26.   -exec-shellcode FILE  Execute supplied shellcode on a client
    27.   -screenshot           Take a screenshot
    28.   -lock-screen          Lock the clients screen
    29.   -shutdown             Shutdown remote computer
    30.   -restart              Restart remote computer
    31.   -logoff               Log off current remote user
    32.   -force-checkin        Force a check in
    33.   -start-keylogger      Start keylogger
    34.   -stop-keylogger       Stop keylogger

    Requirements & Setup

    For this to work you need:
    • Python 2.x
    • PyCrypto module
    • WMI module
    • Enum34 module
    • Netifaces module
    And:
    • A Gmail account (Use a dedicated account! Do not use your personal one!)
    • Turn on “Allow less secure apps” under the security settings of the account.
    • You may also have to enable IMAP in the account settings.

    Download/Install

    You can download Gdog here:
    Or read more here.
    Also look at : How To Scan website vulnerabilities using nikto

    Gdog – Python Windows Backdoor With Gmail Command & Control Gdog – Python Windows Backdoor With Gmail Command & Control Reviewed by Krutik on 13:39:00 Rating: 5

    No comments:

    Powered by Blogger.