Sponsored
Ethical Hacking

Embed Payload (Exe) into a PDF Documents – EvilPDF

Hey folks, today we are going to talk about the tool that can easily add malicious payloads within the .PDF extension files and after which you can easily access any system. As we know it is prohibited to execute malicious payloads inside the window defender system, hence we will send our payload through the PDF files.

Environment

Kali Linux = Attacker
Window 10 = Victim ( Tested On )

Lets take a look 🙂 !!

EvilPDF

The EvilPDF tool is specifically designed to embed payloads inside PDF files. It is an open source tool hosted on the github page that we will download using the wget command.

git clone https://github.com/thelinuxchoice/evilpdf
cd evilpdf

It require some additional features that we can download using the following command.

python -m pip install pypdf2

Now we can use this tool using the given command.

python evilpdf.py

In the image below you have to change these options. Also you do not need to change other options.

Lhost = { Your Locahost Address }
Lport = { Any Which You Want 0-65535 }
Exe File Name = { As Your Requirement }

We will use the php code below which will help us in extending our payload to vicitm.
Usage 🙂 php -S < Your Lhost > : < Your Lport >

First victim will download our zip file and then open the PDF file.

As soon as vcitim opens the PDF file, the payload will be automatically downloaded on that system and as you remember we created a payload named “adobe_update” which will be downloaded by the victim as a software update.

As soon as victim executes the payload, you will have full access of that system immediately.

If you want to take the access of that system as meterpreter so you can use the metasploit framework.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Connect on Linkedin.
Sponsored
Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

View Comments

Recent Posts

How to Connect Kali Linux MCP with Claude Code

This guide explains how to integrate MCP (Model Context Protocol) with Claude using Kali Linux.…

2 months ago

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

1 year ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

2 years ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

2 years ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

2 years ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

3 years ago
Sponsored

This website uses cookies.