Skip to content

HTTP packet sniffing spyware with remote activation and C2 components

License

Notifications You must be signed in to change notification settings

realaravinth/amnesia-client

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Build Status License: GPLv2

Amnesia-Client

WARNING: The author tested this program several times on both VMs and his dev machine before pushing it to Github. But use it at your own risk. The author can't be held liable if this program caused any kind of damage

This is a malicious program that when activated, can capture network traffic and send the capture to a command and control server (checkout amnesia).

Installation

- Debian based distributions:

Pre-compiled packages are available at the release section of this. You may download and install them with:

$ sudo apt instlal -f ./name-of-the-package

Don't forget to substitute the package name at <name-of-the-package>

If prompted to choose weather non-root users should be allowed to run wireshark/tshark, then please allow it.

- From source:

  1. See dependencies and install them
  2. After installing cargo, run:
$ git clone https://github.com/realaravinth/amnesia-client
$ cd amnesia-client && cargo build --release

You'll find the release build at target/release/

Dependencies:

  1. Cargo
  2. Tshark: You'll find it in your distribution's repository, so you can get it from there. If prompted to choose weather non-root users should be allowed to run wireshark/tshark, then please allow it.

Setup:

The name of the internet facing network interface should be based as a parameter to the program. Running the following command will list all network interfaces on your machine:

$ sudo ifconfig

Ethernet devices will begin with an 'e' and wireless interfaces will begin with an 'w'. Assuming your's is wlan0, run the following command to start the program:

$ amnesia-client wlan0

By default, the program binds itself to port 7000. So the web interface can be accessed at

 your-IP-address:7000

To find your IP address, you may run:

$ sudo ifconfig

your IP is the value following INET against your network interface. See highlighted value in the img

ifconfig output

Usage:

The buttons on the web interface indicate the state of the application:

  • Listen mode: Listens for traffic, can be toggled on and off.

  • Upload: Parses the packet capture and filters useful information out.

  • Clear: Wipes the remotely hosted data

  • Dump: Dumps the entire HTTP stream on to the command server, use this only when parsing with upload fails as not only will the payload be large(think > 10MB) but it will also disclose confidential information like passwords.

About

HTTP packet sniffing spyware with remote activation and C2 components

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published