Compiling creates an installer which, when opened on the target device, exploits the vulnerability of a specific program. Different behaviors may be experienced, depending on the specific Exploit (i.e. the running program is aborted).
The installer is created and the packet of utility files is automatically saved in the folder C:\RCS\Collector\public. These files may be used in many types of attacks (i.e.: via link from a website).
The installer must be copied to the device and install.sh run from the copied folder.
IMPORTANT: the device must be unlocked.
The packet of utility files is automatically copied to the folder C:\RCS\Collector\public. These files may be used in many types of attacks (i.e.: via link from a website).
mymac>scp –r ./RCS_IPHONE root@myiphone.local.net:/tmp
mymac>ssh root@myiphone.local.net
myiphone>cd /tmp/RCS_IPHONE
myiphone>sh install.sh
Packets saved in the folder C:\RCS\Collector\public can be deleted using the File Manager function, in System, Frontend section.
Name | Description |
---|---|
File type | Type of file to be infected (i.e.: .PDF). |
Select an Exploit | Full application name used by the target to open the file (i.e.: Adobe Acrobat Reader 10). |
URL Document .... |
Settings that identify the file to be infected. URL: connection to an Anonymizer where the installer was saved. Document: to select the file to be infected. |
RCS9.4 | User's Guide | © COPYRIGHT 2014