.. /Loophole
Star

Install
Access
Download
Phishing
Exfiltration

Loophole is an open source tool which enables local services/applications to be exposed over the internet. Insiders as well as threat actors can use this tool to perform variety of malicious tasks. Although, the tool requires an authentication token of which free token can be obtained from the website.

Paths:

Resources:

Acknowledgements:

Detections:

Install

  1. Exeuction of loophole standlone binaries on the local machine.

    loophole standlone binaries
    Use case
    Executing the loophole standalone binaries to connect it to the tunnels.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Access

  1. Authenticating loophole account with the API key to register the device with the account.

    loophole account login
    Use case
    Registering local machine with the loophole account.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Download

  1. Hosting malicious files over the loophole tunnels and downloading them over to the compromised host.

    ./loophole http 3000
    Use case
    Downloading locally hosted malicious binaries exposed over loophole tunnels to download.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Phishing

  1. Hosting phishing sites locally and exposing them over the loophole tunnels to compromise users.

    ./loophole http 3000
    Use case
    Phishing site hosted locally and exposed over the loophole tunnels to compromise users.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Exfiltration

  1. Exposing local file system over the loophole tunnels to exfiltrate data outside the organization.

    ./loophole path ./my-directory
    Use case
    Exfiltrating data outside organization via loophole tunnels.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux