Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker: MacBook with Snow Leopard 10.6.8 Target: Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther and after MacBook and iMac Mac OS X Mountain Lion 10.8.1. All Mac OS X were connected on intranet lan of an italian ISP. The attacker MacBook is in listening and expected the reverse shell from the target Mac iBook PowerPC G4 that receive a package and when user click on file .pkg and insert the user password, the attacker receive a reverse shell of target. For more details read Features and User Reviews.

Features

  • All tests were conducted in order to study and laboratory to perform test on ids, firewalls and anti-malware on Microsoft Windows, Linux and Mac OS X on an intranet. Which my case it is an italian ISP (Internet Service Provider). The Internal IP Addresses with the same network class of IP addressing used in all tests they relate of internal IP addresses released from DHCP server of ISP. It is a normal adsl. I use Mpge on my adsl without firewalls and ids.The hosts are connected on intranet with RG45 cable to router. After i conducted an other test with two Mac OS X in the same intranet (lan and wifi connection) with addition of a powerline adapter 200 Mbps connected to a electricity network of home and connected with RG45 cable to router. So your network becomes a network packet switching. The program enjoys the GNU General Public License version 3.0 (GPLv3). For Metasploit Framework the license is url: metasploit.com/license.jsp. Disclaimer: This software is provided by the author ''as is'' and any expressed or implied warranties, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the author be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (Including, but not limited to, procurement of substitute goods or services; loss of use, hardware, data, profits, life, or limb; or business interruption) homever caused and on any theory of liability, whether in contract, strict liability, or tort (Including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage. Don't hurt your laptop.You don't have to swing it so hard, you know. If you do break damage to your machine in any way, it is your fault. The connection between MacBook and Mac iBook PowerPC G4 (or the other target iMac) that realizes the root shell of the target Mac iBook POWERPC G4 on the attacker MacBook. Both are connected with RG45 on my router and with addition of powerline adapter 200 Mbps and through the package file .pkg downloaded from a public web mail portal and installed on Mac iBook (or a file .pkg realized with Iceberg or a file .dmg containing a file . app for iMac). This realize an overlap between two shells: first the shell of the listener MacBook and second shell that of the target Mac iBook. Through this overlap you can view and create data (a folder) from MacBook to Mac iBook POWERPC G4. See image of link of Security List Network.
  • For more details see images in a directory Files: Test Environment Mac iBook POWERPC G4 Mac OS X 10.3 Panther, MacBook Mac OS X Snow Leopard 10.6.3 and iMac Mac OS X Mountain Lion 10.8.1.
  • At this point you need to prepare on MacBook attacker a new reverse shell and create a new package with PackageMaker or Iceberg and send it to the target, start a listener on attacker, download a trojan horse file on a target click on it and the connection opens. In all tests the password to install the trojan horse file on Mac OS X PowerPC G4 or iMac is entered by user target of the attack. In my lab the password on target is always inserted by me, imagine that another person. The actual payloads for Mac OS X are: osx/ppc/shell_reverse_tcp and osx/x86/shell_reverse_tcp which realize http reverse shells connections. The reverse shell is insert into files .pkg and files .app.
  • Release of Mpge for OS X Snow Leopard 10.6.8 in directory Files: Mpge OS X Snow Leopard 10.6.8: Mpge v.1.3.tgz. New release of Mpge for OS X Mavericks 10.9 in directory Files: Mpge v.1.0 OS X Mavericks: Mpge v.1.0 OS X Mavericks.tgz.
  • The last version of Mpge for OS X Mavericks 10.9 can take back all tests carried in the laboratory with iMac OS X Mavericks 10.9 as the attacker and MacBook with OS X Snow Leopard 10.6.8 as the target. First you should create with Mpge the reverse shell osx/x86/shell_reverse_tcp named mac1. You can insert it in a package with Iceberg 1.3.1 an application to create packages for iMac OS X Mavericks 10.9. While Package Maker is an auxiliary tools of Xcode and this is for MacBook with OS X Snow Leopard 10.6.8 to create packages for Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther. In the example in Files: The Pyramid the file is Test.pkg which contains the reverse shell and is compressed in Test.zip. It is sent from the attacker MacBook with Snow Leopard 10.6.8 to target Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther through a web mail portal with his credentials ( e-mail address and password of attacker). After the target Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther goes on web mail portal with his credentials, download the file Test.zip, extracts the file Test.pkg and click on it. Is necessary to run it insert the password. After insert the password it is performed the reverse shell and the attacker MacBook with Snow Leopard 10.6.8 with Mpge receives the reverse shell connection performed on target Mac iBook PowerPC G4 with Mac OS X 10.3.5 Panther. The attacker and the target must be in the same network. For more details see directory Files: Mpge v.1.0 OS X Mavericks 10.9.

Project Samples

Project Activity

See All Activity >

Categories

Security

License

GNU General Public License version 3.0 (GPLv3)

Follow Mpge

Mpge Web Site

You Might Also Like
Claims Processing solution for healthcare practitioners. Icon
Claims Processing solution for healthcare practitioners.

Very easy to use for medical, dental and therapy offices.

Speedy Claims became the top CMS-1500 Software by providing the best customer service imaginable to our thousands of clients all over America. Medical billing isn't the kind of thing most people get excited about - it is just a tedious task you have to do. But while it will never be a fun task, it doesn't have to be as difficult or time consumimg as it is now. With Speedy Claims CMS-1500 software you can get the job done quickly and easily, allowing you to focus on the things you love about your job, like helping patients. With a simple interface, powerful features to eliminate repetitive work, and unrivaled customer support, it's simply the best HCFA 1500 software available on the market. A powerful built-in error checking helps ensure your HCFA 1500 form is complete and correctly filled out, preventing CMS-1500 claims from being denied.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
1
0
0
0
0
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5

User Reviews

There are no 5 star reviews.

Additional Project Details

Operating Systems

Linux, Mac, Windows

Languages

Italian

Intended Audience

Security Professionals

Programming Language

Unix Shell

Related Categories

Unix Shell Security Software

Registered

2012-02-09