In the third video in this series we will show how to make your malicious web page. Our web page will host the malicious file, and script we prepared in Part 2. This is the website our malicious document will open which we created in Part 1.
There is not much to do in this video as we are simply copying over the payloads we have already created to our web server, and creating a basic web page where the payloads will be launched from.
We are using Kali as our web server as it comes with Apache pre-installed, however most linux web servers use the same default location for web files.
We browse to the location at “/var/www/html/” then create a new folder named “secure” which is for our new web site.
Now we copy over our secure images which we used in Part 1 to create our malicious document, the malicious exe we created in Part 2, and create a new html file named index.html.
In the video we use the cmd “gedit /var/www/html/secure/index.html”
gedit is the name of the text editing application, and /var/www/html/secure/ is the location, and index.html is the file name. NOTE: If there is already a file with that name in the specified location it will open that file, if it does not exist it will create a new file with that name.
Let’s look at the content of the index.html file. We’ve highlighted the location of the images and the payloads.
Starting at the top we have the BeeF script we created in Part 2 in the head section.
Then in the body section we have the securesystem.png image, and the secure.exe download link in the a href tags.
We have also fluffed out some content to make the page more convincing for when the victim is taken to our site.
You can copy the above html code and just replace the images and payloads with your own.
The final thing we do in the video is make sure the web server is running by using the “Service apache2 start” cmd.
Now we are ready to go to the next video where we will string everything together to see how the attack will launch against our victim when they open the document.