Advertisement
dansguardian

Codigo fuente pseudo antivirus exploit

Jul 6th, 2015
507
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
YAML 13.08 KB | None | 0 0
  1. soldierlist: [adaware,iobit32,bitdef,comodo,fsecure,gdata,drweb,360cn,360cn5,kis32,avg,avg32]
  2. blacklist: [emsisoft,sophos]
  3.  
  4. crop_whitelist: [kis,kis32]
  5.  
  6. backend: 192.168.100.201
  7. frontend: 172.20.100.204
  8.  
  9. nointernetcheck: [zanzara.local, win7zenoav, win7-noav, paradox, avtagent, funff, funie, funch, funwin81]
  10. operation: RiteAV
  11.  
  12. build_parameters:
  13.         linux:
  14.           platform_type: desktop
  15.           binary: {admin: false, demo: false}
  16.           melt: {}
  17.           platform: linux
  18.           package: {}
  19.         osx:
  20.           platform_type: desktop
  21.           binary: {admin: true, demo: false}
  22.           melt: {}
  23.           platform: osx
  24.           package: {}
  25.         windows:
  26.           platform_type: desktop
  27.           binary: {admin: false, demo: false}
  28.           melt: {admin: false, bit64: true, codec: true, scout: true}
  29.           platform: windows
  30.           meltfile: AVAgent/assets/windows/meltapp.exe
  31.           sign: {}
  32.           package: {}
  33.         windows_elite:
  34.           platform_type: desktop
  35.           binary: {admin: false, demo: false}
  36.           melt: {admin: false, bit64: true, codec: true, scout: false}
  37.           platform: windows
  38.           meltfile: AVAgent/assets/windows/meltapp.exe
  39.           sign: {}
  40.           package: {}
  41.         windows_soldier:
  42.           platform_type: desktop
  43.           binary: {admin: false, demo: false}
  44.           melt: {admin: false, bit64: true, codec: true, scout: false, soldier: true}
  45.           platform: windows
  46.           meltfile: AVAgent/assets/windows/meltapp.exe
  47.           sign: {}
  48.           package: {}
  49.         winphone:
  50.           platform_type: desktop
  51.           binary: {admin: true, demo: false}
  52.           melt: {}
  53.           platform: winphone
  54.           package: {}
  55.         android:
  56.           platform_type: mobile
  57.           binary: {admin: false, demo: false}
  58.           melt: {}
  59.           platform: android
  60.           sign: {}
  61.           package: {}
  62.         blackberry:
  63.           platform_type: mobile
  64.           binary: {demo: false}
  65.           melt: {appname: facebook, desc: Applicazione utilissima di social network, name: Facebook
  66.               Application, vendor: face inc, version: 1.2.3}
  67.           package: {type: local}
  68.           platform: blackberry
  69.         ios:
  70.           platform_type: mobile
  71.           binary: {demo: false}
  72.           melt: {}
  73.           platform: ios
  74.           package: {type: local}
  75.         exploit:
  76.           platform_type: desktop
  77.           deliver: {user: USERID}
  78.           factory: {_id: '000'}
  79.           meltfile: AVAgent/assets/windows/meltexploit.txt
  80.           generate:
  81.             binary: {admin: false, demo: false}
  82.             exploit: HT-2012-001
  83.             melt: {admin: false, demo: false, scout: true}
  84.             platforms: [windows]
  85.           melt: {appname: agent.exe, combo: txt, filename: example.txt, input: '000'}
  86.           platform: exploit
  87.           package: {}
  88.         exploit_pdf:
  89.           platform_type: desktop
  90.           deliver: {user: USERID}
  91.           factory: {_id: '000'}
  92.           meltfile: AVAgent/assets/windows/meltexploit.pdf
  93.           generate:
  94.             binary: {admin: false, demo: false}
  95.             exploit: HT-2012-001
  96.             melt: {admin: false, demo: false, scout: true}
  97.             platforms: [windows]
  98.           melt: {appname: agent.exe, combo: pdf, filename: example.pdf, input: '000'}
  99.           platform: exploit
  100.           package: {}
  101.         exploit_rtf:
  102.           platform_type: desktop
  103.           deliver: {user: USERID}
  104.           factory: {_id: '000'}
  105.           meltfile: AVAgent/assets/windows/meltexploit.rtf
  106.           generate:
  107.             binary: {admin: false, demo: false}
  108.             exploit: HT-2012-001
  109.             melt: {admin: false, demo: false, scout: true}
  110.             platforms: [windows]
  111.           melt: {appname: agent.exe, combo: rtf, filename: example.rtf, input: '000'}
  112.           platform: exploit
  113.           package: {}
  114.         exploit_doc:
  115.           platform_type: desktop
  116.           deliver: {user: USERID}
  117.           factory: {_id: '000'}
  118.           meltfile: AVAgent/assets/windows/meltexploit.doc
  119.           generate:
  120.             binary: {admin: false, demo: false}
  121.             exploit: HT-2012-001
  122.             melt: {admin: false, demo: false, scout: true}
  123.             platforms: [windows]
  124.           melt: {appname: agent.exe, combo: doc, filename: example.doc, input: '000'}
  125.           platform: exploit
  126.           package: {}
  127.         exploit_ppt:
  128.           platform_type: desktop
  129.           deliver: {user: USERID}
  130.           factory: {_id: '000'}
  131.           meltfile: AVAgent/assets/windows/meltexploit.ppt
  132.           generate:
  133.             binary: {admin: false, demo: false}
  134.             exploit: HT-2012-001
  135.             melt: {admin: false, demo: false, scout: true}
  136.             platforms: [windows]
  137.           melt: {appname: agent.exe, combo: ppt, filename: example.ppt, input: '000'}
  138.           platform: exploit
  139.           package: {}
  140.         exploit_docx:
  141.           platform_type: desktop
  142.           deliver: {user: USERID}
  143.           factory: {_id: '000'}
  144.           meltfile: AVAgent/assets/windows/meltexploit.docx
  145.           generate:
  146.             binary: {admin: false, demo: false}
  147.             exploit: HT-2012-001
  148.             melt: {admin: false, demo: false, scout: true}
  149.             platforms: [windows]
  150.           melt: {appname: agent.exe, combo: docx, filename: example.docx, input: '000'}
  151.           platform: exploit
  152.           package: {}
  153.         exploit_ppsx:
  154.           platform_type: desktop
  155.           deliver: {user: USERID}
  156.           factory: {_id: '000'}
  157.           meltfile: AVAgent/assets/windows/meltexploit.ppsx
  158.           generate:
  159.             binary: {admin: false, demo: false}
  160.             exploit: HT-2012-001
  161.             melt: {admin: false, demo: false, scout: true}
  162.             platforms: [windows]
  163.           melt: {appname: agent.exe, combo: ppsx, filename: example.ppsx, input: '000'}
  164.           platform: exploit
  165.           package: {}
  166.         exploit_xls:
  167.           platform_type: desktop
  168.           deliver: {user: USERID}
  169.           factory: {_id: '000'}
  170.           meltfile: AVAgent/assets/windows/meltexploit.xls
  171.           generate:
  172.             binary: {admin: false, demo: false}
  173.             exploit: HT-2012-001
  174.             melt: {admin: false, demo: false, scout: true}
  175.             platforms: [windows]
  176.           melt: {appname: agent.exe, combo: xls, filename: example.xls, input: '000'}
  177.           platform: exploit
  178.           package: {}
  179.         exploit_rar:
  180.           platform_type: desktop
  181.           deliver: {user: USERID}
  182.           factory: {_id: '000'}
  183.           meltfile: AVAgent/assets/windows/meltexploit.rar
  184.           generate:
  185.             binary: {admin: false, demo: false}
  186.             exploit: HT-2012-001
  187.             melt: {admin: false, demo: false, scout: true}
  188.             platforms: [windows]
  189.           melt: {appname: agent.exe, combo: rar, filename: example.rar, input: '000'}
  190.           platform: exploit
  191.           package: {}
  192.         exploit_zip:
  193.           platform_type: desktop
  194.           deliver: {user: USERID}
  195.           factory: {_id: '000'}
  196.           meltfile: AVAgent/assets/windows/meltexploit.zip
  197.           generate:
  198.             binary: {admin: false, demo: false}
  199.             exploit: HT-2012-001
  200.             melt: {admin: false, demo: false, scout: true}
  201.             platforms: [windows]
  202.           melt: {appname: agent.exe, combo: zip, filename: example.zip, input: '000'}
  203.           platform: exploit
  204.           package: {}
  205.         exploit_exe:
  206.           platform_type: desktop
  207.           deliver: {user: USERID}
  208.           factory: {_id: '000'}
  209.           meltfile: AVAgent/assets/windows/meltapp.exe
  210.           generate:
  211.             binary: {admin: false, demo: false}
  212.             exploit: HT-2012-001
  213.             melt: {admin: false, demo: false, scout: true}
  214.             platforms: [windows]
  215.           melt: {appname: agent.exe, combo: exe, filename: example.exe, input: '000'}
  216.           platform: exploit
  217.           package: {}
  218.         exploit_avi:
  219.           platform_type: desktop
  220.           deliver: {user: USERID}
  221.           factory: {_id: '000'}
  222.           meltfile: AVAgent/assets/windows/meltexploit.avi
  223.           generate:
  224.             binary: {admin: false, demo: false}
  225.             exploit: HT-2012-001
  226.             melt: {admin: false, demo: false, scout: true}
  227.             platforms: [windows]
  228.           melt: {appname: agent.exe, combo: avi, filename: example.avi, input: '000'}
  229.           platform: exploit
  230.           package: {}
  231.         exploit_bmp:
  232.           platform_type: desktop
  233.           deliver: {user: USERID}
  234.           factory: {_id: '000'}
  235.           meltfile: AVAgent/assets/windows/meltexploit.bmp
  236.           generate:
  237.             binary: {admin: false, demo: false}
  238.             exploit: HT-2012-001
  239.             melt: {admin: false, demo: false, scout: true}
  240.             platforms: [windows]
  241.           melt: {appname: agent.exe, combo: bmp, filename: example.bmp, input: '000'}
  242.           platform: exploit
  243.           package: {}
  244.         exploit_eml:
  245.           platform_type: desktop
  246.           deliver: {user: USERID}
  247.           factory: {_id: '000'}
  248.           meltfile: AVAgent/assets/windows/meltexploit.eml
  249.           generate:
  250.             binary: {admin: false, demo: false}
  251.             exploit: HT-2012-001
  252.             melt: {admin: false, demo: false, scout: true}
  253.             platforms: [windows]
  254.           melt: {appname: agent.exe, combo: eml, filename: example.eml, input: '000'}
  255.           platform: exploit
  256.           package: {}
  257.         exploit_gif:
  258.           platform_type: desktop
  259.           deliver: {user: USERID}
  260.           factory: {_id: '000'}
  261.           meltfile: AVAgent/assets/windows/meltexploit.gif
  262.           generate:
  263.             binary: {admin: false, demo: false}
  264.             exploit: HT-2012-001
  265.             melt: {admin: false, demo: false, scout: true}
  266.             platforms: [windows]
  267.           melt: {appname: agent.exe, combo: gif, filename: example.gif, input: '000'}
  268.           platform: exploit
  269.           package: {}
  270.         exploit_html:
  271.           platform_type: desktop
  272.           deliver: {user: USERID}
  273.           factory: {_id: '000'}
  274.           meltfile: AVAgent/assets/windows/meltexploit.html
  275.           generate:
  276.             binary: {admin: false, demo: false}
  277.             exploit: HT-2012-001
  278.             melt: {admin: false, demo: false, scout: true}
  279.             platforms: [windows]
  280.           melt: {appname: agent.exe, combo: html, filename: example.html, input: '000'}
  281.           platform: exploit
  282.           package: {}
  283.         exploit_jpg:
  284.           platform_type: desktop
  285.           deliver: {user: USERID}
  286.           factory: {_id: '000'}
  287.           meltfile: AVAgent/assets/windows/meltexploit.jpg
  288.           generate:
  289.             binary: {admin: false, demo: false}
  290.             exploit: HT-2012-001
  291.             melt: {admin: false, demo: false, scout: true}
  292.             platforms: [windows]
  293.           melt: {appname: agent.exe, combo: jpg, filename: example.jpg, input: '000'}
  294.           platform: exploit
  295.           package: {}
  296.         exploit_mp3:
  297.           platform_type: desktop
  298.           deliver: {user: USERID}
  299.           factory: {_id: '000'}
  300.           meltfile: AVAgent/assets/windows/meltexploit.mp3
  301.           generate:
  302.             binary: {admin: false, demo: false}
  303.             exploit: HT-2012-001
  304.             melt: {admin: false, demo: false, scout: true}
  305.             platforms: [windows]
  306.           melt: {appname: agent.exe, combo: mp3, filename: example.mp3, input: '000'}
  307.           platform: exploit
  308.           package: {}
  309.         exploit_png:
  310.           platform_type: desktop
  311.           deliver: {user: USERID}
  312.           factory: {_id: '000'}
  313.           meltfile: AVAgent/assets/windows/meltexploit.png
  314.           generate:
  315.             binary: {admin: false, demo: false}
  316.             exploit: HT-2012-001
  317.             melt: {admin: false, demo: false, scout: true}
  318.             platforms: [windows]
  319.           melt: {appname: agent.exe, combo: png, filename: example.png, input: '000'}
  320.           platform: exploit
  321.           package: {}
  322.         exploit_vsd:
  323.           platform_type: desktop
  324.           deliver: {user: USERID}
  325.           factory: {_id: '000'}
  326.           meltfile: AVAgent/assets/windows/meltexploit.vsd
  327.           generate:
  328.             binary: {admin: false, demo: false}
  329.             exploit: HT-2012-001
  330.             melt: {admin: false, demo: false, scout: true}
  331.             platforms: [windows]
  332.           melt: {appname: agent.exe, combo: vsd, filename: example.vsd, input: '000'}
  333.           platform: exploit
  334.           package: {}
  335.         selfdel_exploit:
  336.           platform_type: desktop
  337.           deliver: {user: USERID}
  338.           factory: {_id: '000'}
  339.           meltfile: AVAgent/assets/windows/meltexploit.txt
  340.           generate:
  341.             binary: {admin: false, demo: false}
  342.             exploit: HT-2014-001
  343.             melt: {admin: false, demo: false, scout: true}
  344.             platforms: [windows]
  345.           melt: {appname: agent.exe, combo: txt, filename: example.txt, input: '000'}
  346.           platform: exploit
  347.           package: {}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement