Home

Awesome

PasteJacker Python 3.5 Version

The main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in this attack in one place and one automated job as after searching I found there's no tool doing this job the right way :smile:

Now because this attack depends on what the user will paste, I implemented the Metasploit web-delivery module's idea into the tool so when the user pastes into the terminal, you gets meterpreter session on his device :smile:

Watch tutorial on youtube

What's PasteJacking ?

In short, Pastejacking is a method that malicious websites employ to take control of your computers’ clipboard and change its content to something harmful without your knowledge. From The Windows club definition

So here what I did is automating the original attack and adding two other tricks to fool the user, using HTML and CSS Will talk about it then added meterpreter sessions as I said before.

A simple scenario to make things clear:

  1. The target opens an HTML page served by the tool and this page has anything that makes the user wants to copy from it and paste into the terminal. Ex: package installation instructions
  2. Target copies anything from the page then in the background it gets replaced quickly with our liner.
  3. The user pastes into the terminal and before he notices that the line he copied has been changed :
    • The line gets executed by itself in the background (Without pressing enter)
    • The terminal gets cleared.
    • The user sees the terminal is usable again.
    • You already got your meterpreter session by this time.
  4. All of that happened in less than second and maybe the user thinks this is a bad program and he won't install it :smile:

This tool uses 3 methods to trick user into copying our payload instead of the command he copies:

What's the payload user copies ?

PasteJacker gives you the option to do one of this things:

  1. Generate a msfvenom backdoor on our machine and the liner target gonna copy will download the backdoor on the its machine, through wget or certutil depends on the OS, then executes it on the background without printing anything to the terminal.
  2. Serve a liner that gets you a reverse netcat connection on the target machine running in the background of course.
  3. Serve your custom liner like Metasploit web-delivery payload with adding some touches to hide any possible output.

Screenshots (Not updated)

<img src="https://github.com/D4Vinci/PasteJacker/blob/master/PasteJacker/Screenshots/p0.png" width="100%"></img> <img src="https://github.com/D4Vinci/PasteJacker/blob/master/PasteJacker/Screenshots/p1.png" width="100%"></img> <img src="https://github.com/D4Vinci/PasteJacker/blob/master/PasteJacker/Screenshots/p2.png" width="100%"></img> <img src="https://github.com/D4Vinci/PasteJacker/blob/master/PasteJacker/Screenshots/p3.png" width="100%"></img>

Installing and requirements

Installing

git clone https://github.com/D4Vinci/PasteJacker.git
sudo python3 -m pip install ./PasteJacker
sudo pastejacker

Updating the framework or the database

cd PasteJacker && git pull && cd ..
sudo python3 -m pip install ./PasteJacker --upgrade

References

Contact

Donation

If this tool has been useful for you, feel free to thank me by buying me a coffee or more ;)

Coffee

Disclaimer

PasteJacker is created to help in penetration testing and it's not responsible for any misuse or illegal purposes.

Copying a code from this tool or using it in another tool is accepted as you mention where you get it from :smile:.

Pull requests are always welcomed :D