In this section, we're going to look at another backdoor delivery method: running our backdoor via an active download. In other words, a user will download and install a program that will run as expected, but with our payload, or backdoor, running in the background. This is possible using a tool called Backdoor Factory Proxy. This also requires a man-in-the-middle access method, such as ARP poisoning.
For this example, we'll go with ARP poisoning so that all traffic will be redirected through our own computer. First, we need to modify the configuration of the bdfproxy.cfg file with the following command:
leafpad /etc/bdfproxy/bdfproxy.cfg
We will now do two things. First, set the proxyMode parameter to transparent, as shown in the following screenshot:
Second, change the HOST parameter to your Kali machine's IP address...