Exploit vector (mobile)

Purpose

Compiling creates an installer that, executed on the target device, results in the device being infected.

Different behaviors may be experienced, depending on the specific Exploit (i.e. the running program is aborted).

Installation

The installer must be copied to the device and install.sh run from the copied folder.

IMPORTANT: the device must be unlocked.

The packet of utility files is automatically copied to the folder . These files may be used in many types of attacks (i.e.: via link from a website).

Deleting no longer used files

Packets saved in the folder can be deleted using the File Manager function, see "Frontend management".

Example of installer copy command on the iOS device

mymac>scp –r ./RCS_IPHONE root@myiphone.local.net:/tmp

mymac>ssh root@myiphone.local.net

myiphone>cd /tmp/RCS_IPHONE

myiphone>sh install.sh

Operating systems

iOS

Parameters
Name Description
File type Type of file to be infected (i.e.: .PDF).
Choose an Exploit Full application name used by the target to open the file (i.e.: Adobe Acrobat Reader 10).

URL

Document

....

Settings that identify the file to be infected.

URL: connection to an Anonymizer where the installer was saved. .

Document: select the file to be infected.