Wednesday, 14 October 2015

Stealth Document Grabber

Version 3.6 of redpill Hacker has been released. One of the enhancements is a new type of payload (spy module) called the 'Stealth Document Grabber;.

Stealth Document Grabber

Stealth Document Grabber - Click to enlarge

The Stealth Document Grabber will secretly email documents, pictures and other files on the target computer to you. The Stealth Document Grabber is also part of a new group of lightweight payloads.

Lightweight Payloads vs Heavyweight Payloads

There is a new group of Lightweight Payloads that is available in Version 3.6. These payloads only runs once and only perform specific tasks. The advantage of these payloads is that they are more difficult to detect and they bypass the Windows UAC Warning Message.

Heavyweight payloads can perform multiple tasks (key logging, taking screenshots) and will also continue to monitor a computer even after a computer restart was done. When the payload is however run for the first time it will cause the Windows UAC warning message to pop up. However, redpill Hacker has advanced Social Engineering Templates designed to 'convince' the target to allow the payload to run even when the UAC message appears (version 3.6 also has a couple of new social engineering templates).

Both the lightweight and heavyweight payloads has some pros-and-cons. Both heavyweight and lightweight will secretly install the spy program and both has advanced counter anti-virus detection features. The main difference:
  • Lightweight only runs once and performs a specific task (like the document grabber that sends you the documents on the target computer). They bypass the UAC message and is more difficult to detect. They will have a higher success rate.
  • Heavyweights can perform multiple tasks (key logging, taking screenshots) and can monitor a computer indefinitely. They will have a lower success rate but will return more data when they succeed.
redpill Hacker 3.6 is more flexible and gives you the ability to plan your attack better.For more information about redpill Hacker visit the redpill website.

No comments:

Post a Comment