.. /Telebit
Star

Install
Access
Exfiltration
Shell Access
Download
Phishing

Telebit is an open source tool which enables local services/applications to be exposed over the internet. Insiders as well as threat actors can use this tool to perform variety of malicious tasks. Although, the tool requires an authentication token of which free token can be obtained from the website.

Paths:

Resources:

Acknowledgements:

Detections:

Install

  1. Downloading and Installation of telebit on the local machine.

    curl https://get.telebit.io/ | bash
    Use case
    Downloading the telebit binary to be executed on the local machine.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Access

  1. Binding telebit tunnels to the local port running on the machine to expose the local applications over the tunnels.

    telebit http <PORT>
    Use case
    Exposing local applications over the internet via telebit tunnels.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Exfiltration

  1. Running a local server in a directory and exposing it over the telebit tunnels for data exfiltration.

    telebit http <PORT>
    Use case
    Exposing local file system via telebit tunnels for data exfiltration.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Shell Access

  1. Binding telebit tunnels to the local SSH/RDP ports etc. for shell access.

    telebit tcp <PORT>
    Use case
    Exposing local ports over the internet via telebit tunnels for shell access.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Download

  1. Binding telebit tunnels to the local file system/web server and exposing malicious binaries to be downloaded onto the compromised host.

    telebit http <PORT>
    Use case
    Exposing locally hosted malicious binaries over the internet via telebit tunnels to be downloaded onto compromised host.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux

Phishing

  1. Binding telebit tunnels to the locally running phishing page to compromise users.

    telebit http <PORT>
    Use case
    Exposing locally running phishing sites over the internet via telebit tunnels to compromise users.
    Privileges required
    User
    Operating systems
    Windows, Mac, Linux